prowler-cloud 5.13.1__py3-none-any.whl → 5.14.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (298) hide show
  1. dashboard/__main__.py +2 -1
  2. dashboard/compliance/c5_azure.py +43 -0
  3. dashboard/compliance/fedramp_20x_ksi_low_aws.py +46 -0
  4. dashboard/compliance/fedramp_20x_ksi_low_azure.py +46 -0
  5. dashboard/compliance/fedramp_20x_ksi_low_gcp.py +46 -0
  6. dashboard/compliance/hipaa_gcp.py +25 -0
  7. dashboard/compliance/nist_csf_2_0_aws.py +24 -0
  8. dashboard/compliance/prowler_threatscore_kubernetes.py +28 -0
  9. prowler/AGENTS.md +366 -0
  10. prowler/CHANGELOG.md +93 -2
  11. prowler/__main__.py +54 -7
  12. prowler/compliance/aws/ens_rd2022_aws.json +1 -1
  13. prowler/compliance/aws/fedramp_20x_ksi_low_aws.json +347 -0
  14. prowler/compliance/aws/nis2_aws.json +1 -1
  15. prowler/compliance/aws/nist_csf_2.0_aws.json +1781 -0
  16. prowler/compliance/azure/c5_azure.json +9471 -0
  17. prowler/compliance/azure/ens_rd2022_azure.json +1 -1
  18. prowler/compliance/azure/fedramp_20x_ksi_low_azure.json +358 -0
  19. prowler/compliance/azure/nis2_azure.json +1 -1
  20. prowler/compliance/gcp/c5_gcp.json +9401 -0
  21. prowler/compliance/gcp/ens_rd2022_gcp.json +1 -1
  22. prowler/compliance/gcp/fedramp_20x_ksi_low_gcp.json +293 -0
  23. prowler/compliance/gcp/hipaa_gcp.json +415 -0
  24. prowler/compliance/gcp/nis2_gcp.json +1 -1
  25. prowler/compliance/github/cis_1.0_github.json +6 -2
  26. prowler/compliance/kubernetes/prowler_threatscore_kubernetes.json +1269 -0
  27. prowler/compliance/m365/prowler_threatscore_m365.json +6 -6
  28. prowler/compliance/{oci/cis_3.0_oci.json → oraclecloud/cis_3.0_oraclecloud.json} +1 -1
  29. prowler/config/config.py +59 -5
  30. prowler/config/config.yaml +3 -0
  31. prowler/lib/check/check.py +1 -9
  32. prowler/lib/check/checks_loader.py +65 -1
  33. prowler/lib/check/models.py +12 -2
  34. prowler/lib/check/utils.py +1 -7
  35. prowler/lib/cli/parser.py +17 -7
  36. prowler/lib/mutelist/mutelist.py +15 -7
  37. prowler/lib/outputs/compliance/c5/c5_azure.py +92 -0
  38. prowler/lib/outputs/compliance/c5/c5_gcp.py +92 -0
  39. prowler/lib/outputs/compliance/c5/models.py +54 -0
  40. prowler/lib/outputs/compliance/cis/{cis_oci.py → cis_oraclecloud.py} +7 -7
  41. prowler/lib/outputs/compliance/cis/models.py +3 -3
  42. prowler/lib/outputs/compliance/prowler_threatscore/models.py +29 -0
  43. prowler/lib/outputs/compliance/prowler_threatscore/prowler_threatscore_kubernetes.py +98 -0
  44. prowler/lib/outputs/finding.py +16 -5
  45. prowler/lib/outputs/html/html.py +10 -8
  46. prowler/lib/outputs/outputs.py +1 -1
  47. prowler/lib/outputs/summary_table.py +1 -1
  48. prowler/lib/powershell/powershell.py +12 -11
  49. prowler/lib/scan/scan.py +105 -24
  50. prowler/lib/utils/utils.py +1 -1
  51. prowler/providers/aws/aws_regions_by_service.json +73 -15
  52. prowler/providers/aws/lib/quick_inventory/quick_inventory.py +1 -1
  53. prowler/providers/aws/lib/security_hub/security_hub.py +1 -1
  54. prowler/providers/aws/services/account/account_service.py +1 -1
  55. prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json +1 -3
  56. prowler/providers/aws/services/cloudwatch/cloudwatch_alarm_actions_alarm_state_configured/cloudwatch_alarm_actions_alarm_state_configured.metadata.json +23 -12
  57. prowler/providers/aws/services/cloudwatch/cloudwatch_alarm_actions_enabled/cloudwatch_alarm_actions_enabled.metadata.json +21 -12
  58. prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json +23 -12
  59. prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json +24 -12
  60. prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json +21 -12
  61. prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json +17 -11
  62. prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json +20 -12
  63. prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json +22 -13
  64. prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_no_secrets_in_logs/cloudwatch_log_group_no_secrets_in_logs.metadata.json +22 -17
  65. prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_not_publicly_accessible/cloudwatch_log_group_not_publicly_accessible.metadata.json +18 -12
  66. prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json +27 -13
  67. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json +20 -12
  68. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json +22 -12
  69. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json +25 -12
  70. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json +23 -12
  71. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json +17 -12
  72. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json +21 -12
  73. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json +21 -12
  74. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json +27 -12
  75. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json +22 -12
  76. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json +26 -12
  77. prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json +25 -12
  78. prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json +20 -11
  79. prowler/providers/aws/services/codebuild/codebuild_project_logging_enabled/codebuild_project_logging_enabled.metadata.json +22 -12
  80. prowler/providers/aws/services/codebuild/codebuild_project_no_secrets_in_variables/codebuild_project_no_secrets_in_variables.metadata.json +28 -12
  81. prowler/providers/aws/services/codebuild/codebuild_project_not_publicly_accessible/codebuild_project_not_publicly_accessible.metadata.json +22 -12
  82. prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json +15 -10
  83. prowler/providers/aws/services/codebuild/codebuild_project_s3_logs_encrypted/codebuild_project_s3_logs_encrypted.metadata.json +19 -11
  84. prowler/providers/aws/services/codebuild/codebuild_project_source_repo_url_no_sensitive_credentials/codebuild_project_source_repo_url_no_sensitive_credentials.metadata.json +21 -12
  85. prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json +19 -12
  86. prowler/providers/aws/services/codebuild/codebuild_project_uses_allowed_github_organizations/codebuild_project_uses_allowed_github_organizations.metadata.json +24 -13
  87. prowler/providers/aws/services/codebuild/codebuild_report_group_export_encrypted/codebuild_report_group_export_encrypted.metadata.json +35 -13
  88. prowler/providers/aws/services/codepipeline/__init__.py +0 -0
  89. prowler/providers/aws/services/codepipeline/codepipeline_client.py +6 -0
  90. prowler/providers/aws/services/codepipeline/codepipeline_project_repo_private/__init__.py +0 -0
  91. prowler/providers/aws/services/codepipeline/codepipeline_project_repo_private/codepipeline_project_repo_private.metadata.json +30 -0
  92. prowler/providers/aws/services/codepipeline/codepipeline_project_repo_private/codepipeline_project_repo_private.py +95 -0
  93. prowler/providers/aws/services/codepipeline/codepipeline_service.py +164 -0
  94. prowler/providers/aws/services/directconnect/directconnect_connection_redundancy/directconnect_connection_redundancy.metadata.json +18 -12
  95. prowler/providers/aws/services/directconnect/directconnect_virtual_interface_redundancy/directconnect_virtual_interface_redundancy.metadata.json +18 -12
  96. prowler/providers/aws/services/documentdb/documentdb_cluster_backup_enabled/documentdb_cluster_backup_enabled.metadata.json +24 -13
  97. prowler/providers/aws/services/documentdb/documentdb_cluster_cloudwatch_log_export/documentdb_cluster_cloudwatch_log_export.metadata.json +23 -13
  98. prowler/providers/aws/services/documentdb/documentdb_cluster_deletion_protection/documentdb_cluster_deletion_protection.metadata.json +24 -13
  99. prowler/providers/aws/services/documentdb/documentdb_cluster_multi_az_enabled/documentdb_cluster_multi_az_enabled.metadata.json +19 -13
  100. prowler/providers/aws/services/documentdb/documentdb_cluster_public_snapshot/documentdb_cluster_public_snapshot.metadata.json +20 -10
  101. prowler/providers/aws/services/documentdb/documentdb_cluster_storage_encrypted/documentdb_cluster_storage_encrypted.metadata.json +26 -13
  102. prowler/providers/aws/services/drs/drs_job_exist/drs_job_exist.metadata.json +20 -10
  103. prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json +18 -11
  104. prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_in_transit_encryption_enabled/dynamodb_accelerator_cluster_in_transit_encryption_enabled.metadata.json +16 -11
  105. prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_multi_az/dynamodb_accelerator_cluster_multi_az.metadata.json +21 -13
  106. prowler/providers/aws/services/dynamodb/dynamodb_table_autoscaling_enabled/dynamodb_table_autoscaling_enabled.metadata.json +20 -12
  107. prowler/providers/aws/services/dynamodb/dynamodb_table_cross_account_access/dynamodb_table_cross_account_access.metadata.json +17 -10
  108. prowler/providers/aws/services/dynamodb/dynamodb_table_deletion_protection_enabled/dynamodb_table_deletion_protection_enabled.metadata.json +21 -13
  109. prowler/providers/aws/services/dynamodb/dynamodb_table_protected_by_backup_plan/dynamodb_table_protected_by_backup_plan.metadata.json +18 -12
  110. prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json +18 -12
  111. prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json +19 -12
  112. prowler/providers/aws/services/ecr/ecr_registry_scan_images_on_push_enabled/ecr_registry_scan_images_on_push_enabled.metadata.json +16 -11
  113. prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json +22 -13
  114. prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json +19 -13
  115. prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json +21 -13
  116. prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json +22 -12
  117. prowler/providers/aws/services/ecr/ecr_repositories_tag_immutability/ecr_repositories_tag_immutability.metadata.json +20 -12
  118. prowler/providers/aws/services/ecs/ecs_cluster_container_insights_enabled/ecs_cluster_container_insights_enabled.metadata.json +21 -11
  119. prowler/providers/aws/services/ecs/ecs_service_fargate_latest_platform_version/ecs_service_fargate_latest_platform_version.metadata.json +20 -11
  120. prowler/providers/aws/services/ecs/ecs_service_no_assign_public_ip/ecs_service_no_assign_public_ip.metadata.json +18 -12
  121. prowler/providers/aws/services/ecs/ecs_task_definitions_containers_readonly_access/ecs_task_definitions_containers_readonly_access.metadata.json +20 -13
  122. prowler/providers/aws/services/ecs/ecs_task_definitions_host_namespace_not_shared/ecs_task_definitions_host_namespace_not_shared.metadata.json +21 -13
  123. prowler/providers/aws/services/ecs/ecs_task_definitions_host_networking_mode_users/ecs_task_definitions_host_networking_mode_users.metadata.json +26 -13
  124. prowler/providers/aws/services/ecs/ecs_task_definitions_logging_block_mode/ecs_task_definitions_logging_block_mode.metadata.json +19 -12
  125. prowler/providers/aws/services/ecs/ecs_task_definitions_logging_enabled/ecs_task_definitions_logging_enabled.metadata.json +18 -12
  126. prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json +16 -12
  127. prowler/providers/aws/services/ecs/ecs_task_definitions_no_privileged_containers/ecs_task_definitions_no_privileged_containers.metadata.json +21 -14
  128. prowler/providers/aws/services/ecs/ecs_task_set_no_assign_public_ip/ecs_task_set_no_assign_public_ip.metadata.json +19 -13
  129. prowler/providers/aws/services/eks/eks_cluster_deletion_protection_enabled/eks_cluster_deletion_protection_enabled.metadata.json +20 -13
  130. prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json +20 -13
  131. prowler/providers/aws/services/eks/eks_cluster_network_policy_enabled/eks_cluster_network_policy_enabled.metadata.json +20 -14
  132. prowler/providers/aws/services/eks/eks_cluster_not_publicly_accessible/eks_cluster_not_publicly_accessible.metadata.json +22 -13
  133. prowler/providers/aws/services/eks/eks_cluster_private_nodes_enabled/eks_cluster_private_nodes_enabled.metadata.json +19 -13
  134. prowler/providers/aws/services/eks/eks_cluster_uses_a_supported_version/eks_cluster_uses_a_supported_version.metadata.json +21 -12
  135. prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json +20 -13
  136. prowler/providers/aws/services/elasticache/elasticache_cluster_uses_public_subnet/elasticache_cluster_uses_public_subnet.metadata.json +20 -12
  137. prowler/providers/aws/services/elasticache/elasticache_redis_cluster_auto_minor_version_upgrades/elasticache_redis_cluster_auto_minor_version_upgrades.metadata.json +21 -12
  138. prowler/providers/aws/services/elasticache/elasticache_redis_cluster_automatic_failover_enabled/elasticache_redis_cluster_automatic_failover_enabled.metadata.json +20 -13
  139. prowler/providers/aws/services/elasticache/elasticache_redis_cluster_backup_enabled/elasticache_redis_cluster_backup_enabled.metadata.json +23 -13
  140. prowler/providers/aws/services/elasticache/elasticache_redis_cluster_in_transit_encryption_enabled/elasticache_redis_cluster_in_transit_encryption_enabled.metadata.json +21 -12
  141. prowler/providers/aws/services/elasticache/elasticache_redis_cluster_multi_az_enabled/elasticache_redis_cluster_multi_az_enabled.metadata.json +22 -14
  142. prowler/providers/aws/services/elasticache/elasticache_redis_cluster_rest_encryption_enabled/elasticache_redis_cluster_rest_encryption_enabled.metadata.json +20 -11
  143. prowler/providers/aws/services/elasticache/elasticache_redis_replication_group_auth_enabled/elasticache_redis_replication_group_auth_enabled.metadata.json +23 -13
  144. prowler/providers/aws/services/elasticbeanstalk/elasticbeanstalk_environment_cloudwatch_logging_enabled/elasticbeanstalk_environment_cloudwatch_logging_enabled.metadata.json +18 -12
  145. prowler/providers/aws/services/elasticbeanstalk/elasticbeanstalk_environment_enhanced_health_reporting/elasticbeanstalk_environment_enhanced_health_reporting.metadata.json +17 -12
  146. prowler/providers/aws/services/elasticbeanstalk/elasticbeanstalk_environment_managed_updates_enabled/elasticbeanstalk_environment_managed_updates_enabled.metadata.json +17 -11
  147. prowler/providers/aws/services/elb/elb_connection_draining_enabled/elb_connection_draining_enabled.metadata.json +22 -13
  148. prowler/providers/aws/services/elb/elb_cross_zone_load_balancing_enabled/elb_cross_zone_load_balancing_enabled.metadata.json +24 -13
  149. prowler/providers/aws/services/elb/elb_desync_mitigation_mode/elb_desync_mitigation_mode.metadata.json +20 -11
  150. prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json +20 -10
  151. prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json +20 -11
  152. prowler/providers/aws/services/elb/elb_is_in_multiple_az/elb_is_in_multiple_az.metadata.json +20 -12
  153. prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json +19 -12
  154. prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json +19 -11
  155. prowler/providers/aws/services/elb/elb_ssl_listeners_use_acm_certificate/elb_ssl_listeners_use_acm_certificate.metadata.json +17 -12
  156. prowler/providers/aws/services/elbv2/elbv2_cross_zone_load_balancing_enabled/elbv2_cross_zone_load_balancing_enabled.metadata.json +21 -13
  157. prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json +19 -11
  158. prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json +21 -12
  159. prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json +18 -11
  160. prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json +17 -10
  161. prowler/providers/aws/services/elbv2/elbv2_is_in_multiple_az/elbv2_is_in_multiple_az.metadata.json +22 -13
  162. prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json +18 -12
  163. prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json +17 -12
  164. prowler/providers/aws/services/elbv2/elbv2_nlb_tls_termination_enabled/elbv2_nlb_tls_termination_enabled.metadata.json +18 -11
  165. prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json +18 -12
  166. prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json +16 -11
  167. prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json +21 -13
  168. prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json +24 -11
  169. prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json +18 -11
  170. prowler/providers/aws/services/eventbridge/eventbridge_bus_cross_account_access/eventbridge_bus_cross_account_access.metadata.json +26 -13
  171. prowler/providers/aws/services/eventbridge/eventbridge_bus_exposed/eventbridge_bus_exposed.metadata.json +21 -11
  172. prowler/providers/aws/services/eventbridge/eventbridge_global_endpoint_event_replication_enabled/eventbridge_global_endpoint_event_replication_enabled.metadata.json +24 -13
  173. prowler/providers/aws/services/eventbridge/eventbridge_schema_registry_cross_account_access/eventbridge_schema_registry_cross_account_access.metadata.json +26 -14
  174. prowler/providers/aws/services/firehose/firehose_stream_encrypted_at_rest/firehose_stream_encrypted_at_rest.metadata.json +26 -15
  175. prowler/providers/aws/services/firehose/firehose_stream_encrypted_at_rest/firehose_stream_encrypted_at_rest.py +15 -16
  176. prowler/providers/aws/services/fms/fms_policy_compliant/fms_policy_compliant.metadata.json +23 -11
  177. prowler/providers/aws/services/fsx/fsx_file_system_copy_tags_to_backups_enabled/fsx_file_system_copy_tags_to_backups_enabled.metadata.json +19 -12
  178. prowler/providers/aws/services/fsx/fsx_file_system_copy_tags_to_volumes_enabled/fsx_file_system_copy_tags_to_volumes_enabled.metadata.json +17 -12
  179. prowler/providers/aws/services/fsx/fsx_windows_file_system_multi_az_enabled/fsx_windows_file_system_multi_az_enabled.metadata.json +22 -13
  180. prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json +21 -12
  181. prowler/providers/aws/services/iam/lib/policy.py +24 -16
  182. prowler/providers/aws/services/kinesis/kinesis_stream_data_retention_period/kinesis_stream_data_retention_period.metadata.json +21 -13
  183. prowler/providers/aws/services/kinesis/kinesis_stream_encrypted_at_rest/kinesis_stream_encrypted_at_rest.metadata.json +22 -13
  184. prowler/providers/azure/services/cosmosdb/cosmosdb_service.py +7 -2
  185. prowler/providers/azure/services/defender/defender_service.py +4 -2
  186. prowler/providers/azure/services/postgresql/postgresql_flexible_server_entra_id_authentication_enabled/__init__.py +0 -0
  187. prowler/providers/azure/services/postgresql/postgresql_flexible_server_entra_id_authentication_enabled/postgresql_flexible_server_entra_id_authentication_enabled.metadata.json +36 -0
  188. prowler/providers/azure/services/postgresql/postgresql_flexible_server_entra_id_authentication_enabled/postgresql_flexible_server_entra_id_authentication_enabled.py +43 -0
  189. prowler/providers/azure/services/postgresql/postgresql_service.py +66 -9
  190. prowler/providers/azure/services/storage/storage_service.py +13 -4
  191. prowler/providers/azure/services/vm/vm_service.py +4 -7
  192. prowler/providers/common/arguments.py +19 -16
  193. prowler/providers/common/provider.py +2 -18
  194. prowler/providers/gcp/services/artifacts/artifacts_container_analysis_enabled/artifacts_container_analysis_enabled.metadata.json +16 -15
  195. prowler/providers/gcp/services/cloudresourcemanager/cloudresourcemanager_service.py +30 -4
  196. prowler/providers/gcp/services/cloudstorage/cloudstorage_audit_logs_enabled/__init__.py +0 -0
  197. prowler/providers/gcp/services/cloudstorage/cloudstorage_audit_logs_enabled/cloudstorage_audit_logs_enabled.metadata.json +36 -0
  198. prowler/providers/gcp/services/cloudstorage/cloudstorage_audit_logs_enabled/cloudstorage_audit_logs_enabled.py +61 -0
  199. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_log_retention_policy_lock/cloudstorage_bucket_log_retention_policy_lock.metadata.json +12 -9
  200. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_log_retention_policy_lock/cloudstorage_bucket_log_retention_policy_lock.py +10 -3
  201. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_logging_enabled/__init__.py +0 -0
  202. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_logging_enabled/cloudstorage_bucket_logging_enabled.metadata.json +36 -0
  203. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_logging_enabled/cloudstorage_bucket_logging_enabled.py +40 -0
  204. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_soft_delete_enabled/__init__.py +0 -0
  205. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_soft_delete_enabled/cloudstorage_bucket_soft_delete_enabled.metadata.json +36 -0
  206. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_soft_delete_enabled/cloudstorage_bucket_soft_delete_enabled.py +31 -0
  207. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_sufficient_retention_period/__init__.py +0 -0
  208. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_sufficient_retention_period/cloudstorage_bucket_sufficient_retention_period.metadata.json +35 -0
  209. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_sufficient_retention_period/cloudstorage_bucket_sufficient_retention_period.py +55 -0
  210. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_versioning_enabled/__init__.py +0 -0
  211. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_versioning_enabled/cloudstorage_bucket_versioning_enabled.metadata.json +36 -0
  212. prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_versioning_enabled/cloudstorage_bucket_versioning_enabled.py +30 -0
  213. prowler/providers/gcp/services/cloudstorage/cloudstorage_service.py +48 -2
  214. prowler/providers/github/services/organization/organization_default_repository_permission_strict/__init__.py +0 -0
  215. prowler/providers/github/services/organization/organization_default_repository_permission_strict/organization_default_repository_permission_strict.metadata.json +35 -0
  216. prowler/providers/github/services/organization/organization_default_repository_permission_strict/organization_default_repository_permission_strict.py +36 -0
  217. prowler/providers/github/services/organization/organization_members_mfa_required/organization_members_mfa_required.metadata.json +14 -8
  218. prowler/providers/github/services/organization/organization_repository_creation_limited/__init__.py +0 -0
  219. prowler/providers/github/services/organization/organization_repository_creation_limited/organization_repository_creation_limited.metadata.json +30 -0
  220. prowler/providers/github/services/organization/organization_repository_creation_limited/organization_repository_creation_limited.py +106 -0
  221. prowler/providers/github/services/organization/organization_service.py +84 -10
  222. prowler/providers/iac/iac_provider.py +279 -55
  223. prowler/providers/kubernetes/services/etcd/etcd_client_cert_auth/etcd_client_cert_auth.metadata.json +18 -13
  224. prowler/providers/kubernetes/services/etcd/etcd_no_auto_tls/etcd_no_auto_tls.metadata.json +16 -11
  225. prowler/providers/kubernetes/services/etcd/etcd_no_peer_auto_tls/etcd_no_peer_auto_tls.metadata.json +16 -11
  226. prowler/providers/kubernetes/services/etcd/etcd_peer_client_cert_auth/etcd_peer_client_cert_auth.metadata.json +18 -13
  227. prowler/providers/kubernetes/services/etcd/etcd_peer_tls_config/etcd_peer_tls_config.metadata.json +16 -12
  228. prowler/providers/kubernetes/services/etcd/etcd_tls_encryption/etcd_tls_encryption.metadata.json +16 -11
  229. prowler/providers/kubernetes/services/etcd/etcd_unique_ca/etcd_unique_ca.metadata.json +16 -10
  230. prowler/providers/m365/lib/powershell/m365_powershell.py +80 -93
  231. prowler/providers/m365/m365_provider.py +1 -6
  232. prowler/providers/m365/services/exchange/exchange_mailbox_policy_additional_storage_restricted/exchange_mailbox_policy_additional_storage_restricted.py +17 -21
  233. prowler/providers/m365/services/exchange/exchange_service.py +18 -12
  234. prowler/providers/m365/services/sharepoint/sharepoint_external_sharing_managed/sharepoint_external_sharing_managed.py +9 -7
  235. prowler/providers/mongodbatlas/exceptions/exceptions.py +16 -0
  236. prowler/providers/mongodbatlas/mongodbatlas_provider.py +15 -3
  237. prowler/providers/mongodbatlas/services/projects/projects_auditing_enabled/projects_auditing_enabled.metadata.json +20 -9
  238. prowler/providers/mongodbatlas/services/projects/projects_network_access_list_exposed_to_internet/projects_network_access_list_exposed_to_internet.metadata.json +14 -9
  239. prowler/providers/oraclecloud/lib/arguments/arguments.py +4 -13
  240. prowler/providers/oraclecloud/lib/service/service.py +3 -3
  241. prowler/providers/oraclecloud/{oci_provider.py → oraclecloud_provider.py} +15 -15
  242. prowler/providers/oraclecloud/services/analytics/analytics_instance_access_restricted/analytics_instance_access_restricted.metadata.json +20 -16
  243. prowler/providers/oraclecloud/services/audit/audit_log_retention_period_365_days/audit_log_retention_period_365_days.metadata.json +17 -17
  244. prowler/providers/oraclecloud/services/blockstorage/blockstorage_block_volume_encrypted_with_cmk/blockstorage_block_volume_encrypted_with_cmk.metadata.json +17 -19
  245. prowler/providers/oraclecloud/services/blockstorage/blockstorage_boot_volume_encrypted_with_cmk/blockstorage_boot_volume_encrypted_with_cmk.metadata.json +18 -18
  246. prowler/providers/oraclecloud/services/cloudguard/cloudguard_enabled/cloudguard_enabled.metadata.json +17 -18
  247. prowler/providers/oraclecloud/services/compute/compute_instance_in_transit_encryption_enabled/compute_instance_in_transit_encryption_enabled.metadata.json +1 -1
  248. prowler/providers/oraclecloud/services/compute/compute_instance_legacy_metadata_endpoint_disabled/compute_instance_legacy_metadata_endpoint_disabled.metadata.json +1 -1
  249. prowler/providers/oraclecloud/services/compute/compute_instance_secure_boot_enabled/compute_instance_secure_boot_enabled.metadata.json +1 -1
  250. prowler/providers/oraclecloud/services/database/database_autonomous_database_access_restricted/database_autonomous_database_access_restricted.metadata.json +1 -1
  251. prowler/providers/oraclecloud/services/events/events_notification_topic_and_subscription_exists/events_notification_topic_and_subscription_exists.metadata.json +1 -1
  252. prowler/providers/oraclecloud/services/events/events_rule_cloudguard_problems/events_rule_cloudguard_problems.metadata.json +1 -1
  253. prowler/providers/oraclecloud/services/events/events_rule_iam_group_changes/events_rule_iam_group_changes.metadata.json +1 -1
  254. prowler/providers/oraclecloud/services/events/events_rule_iam_policy_changes/events_rule_iam_policy_changes.metadata.json +1 -1
  255. prowler/providers/oraclecloud/services/events/events_rule_identity_provider_changes/events_rule_identity_provider_changes.metadata.json +1 -1
  256. prowler/providers/oraclecloud/services/events/events_rule_idp_group_mapping_changes/events_rule_idp_group_mapping_changes.metadata.json +1 -1
  257. prowler/providers/oraclecloud/services/events/events_rule_local_user_authentication/events_rule_local_user_authentication.metadata.json +1 -1
  258. prowler/providers/oraclecloud/services/events/events_rule_network_gateway_changes/events_rule_network_gateway_changes.metadata.json +1 -1
  259. prowler/providers/oraclecloud/services/events/events_rule_network_security_group_changes/events_rule_network_security_group_changes.metadata.json +1 -1
  260. prowler/providers/oraclecloud/services/events/events_rule_route_table_changes/events_rule_route_table_changes.metadata.json +1 -1
  261. prowler/providers/oraclecloud/services/events/events_rule_security_list_changes/events_rule_security_list_changes.metadata.json +1 -1
  262. prowler/providers/oraclecloud/services/events/events_rule_user_changes/events_rule_user_changes.metadata.json +1 -1
  263. prowler/providers/oraclecloud/services/events/events_rule_vcn_changes/events_rule_vcn_changes.metadata.json +1 -1
  264. prowler/providers/oraclecloud/services/filestorage/filestorage_file_system_encrypted_with_cmk/filestorage_file_system_encrypted_with_cmk.metadata.json +1 -1
  265. prowler/providers/oraclecloud/services/identity/identity_iam_admins_cannot_update_tenancy_admins/identity_iam_admins_cannot_update_tenancy_admins.metadata.json +1 -1
  266. prowler/providers/oraclecloud/services/identity/identity_instance_principal_used/identity_instance_principal_used.metadata.json +1 -1
  267. prowler/providers/oraclecloud/services/identity/identity_no_resources_in_root_compartment/identity_no_resources_in_root_compartment.metadata.json +1 -1
  268. prowler/providers/oraclecloud/services/identity/identity_non_root_compartment_exists/identity_non_root_compartment_exists.metadata.json +1 -1
  269. prowler/providers/oraclecloud/services/identity/identity_password_policy_expires_within_365_days/identity_password_policy_expires_within_365_days.metadata.json +1 -1
  270. prowler/providers/oraclecloud/services/identity/identity_password_policy_minimum_length_14/identity_password_policy_minimum_length_14.metadata.json +1 -1
  271. prowler/providers/oraclecloud/services/identity/identity_password_policy_prevents_reuse/identity_password_policy_prevents_reuse.metadata.json +1 -1
  272. prowler/providers/oraclecloud/services/identity/identity_service_level_admins_exist/identity_service_level_admins_exist.metadata.json +1 -1
  273. prowler/providers/oraclecloud/services/identity/identity_tenancy_admin_permissions_limited/identity_tenancy_admin_permissions_limited.metadata.json +1 -1
  274. prowler/providers/oraclecloud/services/identity/identity_tenancy_admin_users_no_api_keys/identity_tenancy_admin_users_no_api_keys.metadata.json +1 -1
  275. prowler/providers/oraclecloud/services/identity/identity_user_api_keys_rotated_90_days/identity_user_api_keys_rotated_90_days.metadata.json +1 -1
  276. prowler/providers/oraclecloud/services/identity/identity_user_auth_tokens_rotated_90_days/identity_user_auth_tokens_rotated_90_days.metadata.json +1 -1
  277. prowler/providers/oraclecloud/services/identity/identity_user_customer_secret_keys_rotated_90_days/identity_user_customer_secret_keys_rotated_90_days.metadata.json +1 -1
  278. prowler/providers/oraclecloud/services/identity/identity_user_db_passwords_rotated_90_days/identity_user_db_passwords_rotated_90_days.metadata.json +1 -1
  279. prowler/providers/oraclecloud/services/identity/identity_user_mfa_enabled_console_access/identity_user_mfa_enabled_console_access.metadata.json +1 -1
  280. prowler/providers/oraclecloud/services/identity/identity_user_valid_email_address/identity_user_valid_email_address.metadata.json +1 -1
  281. prowler/providers/oraclecloud/services/integration/integration_instance_access_restricted/integration_instance_access_restricted.metadata.json +1 -1
  282. prowler/providers/oraclecloud/services/kms/kms_key_rotation_enabled/kms_key_rotation_enabled.metadata.json +1 -1
  283. prowler/providers/oraclecloud/services/network/network_default_security_list_restricts_traffic/network_default_security_list_restricts_traffic.metadata.json +1 -1
  284. prowler/providers/oraclecloud/services/network/network_security_group_ingress_from_internet_to_rdp_port/network_security_group_ingress_from_internet_to_rdp_port.metadata.json +1 -1
  285. prowler/providers/oraclecloud/services/network/network_security_group_ingress_from_internet_to_ssh_port/network_security_group_ingress_from_internet_to_ssh_port.metadata.json +1 -1
  286. prowler/providers/oraclecloud/services/network/network_security_list_ingress_from_internet_to_rdp_port/network_security_list_ingress_from_internet_to_rdp_port.metadata.json +1 -1
  287. prowler/providers/oraclecloud/services/network/network_security_list_ingress_from_internet_to_ssh_port/network_security_list_ingress_from_internet_to_ssh_port.metadata.json +1 -1
  288. prowler/providers/oraclecloud/services/network/network_vcn_subnet_flow_logs_enabled/network_vcn_subnet_flow_logs_enabled.metadata.json +1 -1
  289. prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_encrypted_with_cmk/objectstorage_bucket_encrypted_with_cmk.metadata.json +1 -1
  290. prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_logging_enabled/objectstorage_bucket_logging_enabled.metadata.json +1 -1
  291. prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_not_publicly_accessible/objectstorage_bucket_not_publicly_accessible.metadata.json +1 -1
  292. prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_versioning_enabled/objectstorage_bucket_versioning_enabled.metadata.json +1 -1
  293. {prowler_cloud-5.13.1.dist-info → prowler_cloud-5.14.1.dist-info}/METADATA +17 -16
  294. {prowler_cloud-5.13.1.dist-info → prowler_cloud-5.14.1.dist-info}/RECORD +298 -249
  295. /prowler/compliance/{oci → oraclecloud}/__init__.py +0 -0
  296. {prowler_cloud-5.13.1.dist-info → prowler_cloud-5.14.1.dist-info}/LICENSE +0 -0
  297. {prowler_cloud-5.13.1.dist-info → prowler_cloud-5.14.1.dist-info}/WHEEL +0 -0
  298. {prowler_cloud-5.13.1.dist-info → prowler_cloud-5.14.1.dist-info}/entry_points.txt +0 -0
@@ -0,0 +1,1781 @@
1
+ {
2
+ "Framework": "NIST-CSF",
3
+ "Name": "National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) v2.0",
4
+ "Version": "2.0",
5
+ "Provider": "AWS",
6
+ "Description": "The NIST Cybersecurity Framework (CSF) 2.0 offers a taxonomy of high-level cybersecurity outcomes that can be used by any organization regardless of its size, sector, or maturity to better understand, assess, prioritize, and communicate its cybersecurity efforts. The framework's core functions are organized into six key areas: Govern (new), Identify, Protect, Detect, Respond, and Recover. Together, these functions provide a comprehensive lifecycle approach to managing cybersecurity risk.",
7
+ "Requirements": [
8
+ {
9
+ "Id": "oc_1",
10
+ "Name": "GV.OC-1",
11
+ "Description": "The organization's role in the supply chain is identified and communicated.",
12
+ "Attributes": [
13
+ {
14
+ "ItemId": "oc_1",
15
+ "Section": "Govern (GV)",
16
+ "SubSection": "Organizational Context (GV.OC)",
17
+ "Service": "aws"
18
+ }
19
+ ],
20
+ "Checks": []
21
+ },
22
+ {
23
+ "Id": "oc_2",
24
+ "Name": "GV.OC-2",
25
+ "Description": "Legal, regulatory, and contractual requirements regarding cybersecurity including privacy and civil liberties obligations are understood and managed.",
26
+ "Attributes": [
27
+ {
28
+ "ItemId": "oc_2",
29
+ "Section": "Govern (GV)",
30
+ "SubSection": "Organizational Context (GV.OC)",
31
+ "Service": "aws"
32
+ }
33
+ ],
34
+ "Checks": []
35
+ },
36
+ {
37
+ "Id": "oc_3",
38
+ "Name": "GV.OC-3",
39
+ "Description": "The organization's place in critical infrastructure and its industry sector is identified and communicated.",
40
+ "Attributes": [
41
+ {
42
+ "ItemId": "oc_3",
43
+ "Section": "Govern (GV)",
44
+ "SubSection": "Organizational Context (GV.OC)",
45
+ "Service": "aws"
46
+ }
47
+ ],
48
+ "Checks": []
49
+ },
50
+ {
51
+ "Id": "rm_1",
52
+ "Name": "GV.RM-1",
53
+ "Description": "Organizational cybersecurity risk management strategy is established, communicated, and maintained.",
54
+ "Attributes": [
55
+ {
56
+ "ItemId": "rm_1",
57
+ "Section": "Govern (GV)",
58
+ "SubSection": "Risk Management Strategy (GV.RM)",
59
+ "Service": "aws"
60
+ }
61
+ ],
62
+ "Checks": [
63
+ "config_recorder_all_regions_enabled",
64
+ "config_recorder_using_aws_service_role",
65
+ "organizations_account_part_of_organizations",
66
+ "organizations_scp_check_deny_regions",
67
+ "organizations_tags_policies_enabled_and_attached",
68
+ "organizations_delegated_administrators",
69
+ "organizations_opt_out_ai_services_policy",
70
+ "trustedadvisor_premium_support_plan_subscribed",
71
+ "trustedadvisor_errors_and_warnings",
72
+ "securityhub_enabled",
73
+ "wellarchitected_workload_no_high_or_medium_risks",
74
+ "servicecatalog_portfolio_shared_within_organization_only"
75
+ ]
76
+ },
77
+ {
78
+ "Id": "rm_2",
79
+ "Name": "GV.RM-2",
80
+ "Description": "Organizational risk tolerance is determined and clearly expressed.",
81
+ "Attributes": [
82
+ {
83
+ "ItemId": "rm_2",
84
+ "Section": "Govern (GV)",
85
+ "SubSection": "Risk Management Strategy (GV.RM)",
86
+ "Service": "aws"
87
+ }
88
+ ],
89
+ "Checks": []
90
+ },
91
+ {
92
+ "Id": "rm_3",
93
+ "Name": "GV.RM-3",
94
+ "Description": "The organization's determination of risk tolerance is informed by its role in critical infrastructure, sector-specific risk analysis, or organizational risk analysis.",
95
+ "Attributes": [
96
+ {
97
+ "ItemId": "rm_3",
98
+ "Section": "Govern (GV)",
99
+ "SubSection": "Risk Management Strategy (GV.RM)",
100
+ "Service": "aws"
101
+ }
102
+ ],
103
+ "Checks": []
104
+ },
105
+ {
106
+ "Id": "sc_1",
107
+ "Name": "GV.SC-1",
108
+ "Description": "Cybersecurity supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders.",
109
+ "Attributes": [
110
+ {
111
+ "ItemId": "sc_1",
112
+ "Section": "Govern (GV)",
113
+ "SubSection": "Cybersecurity Supply Chain Risk Management (GV.SC)",
114
+ "Service": "aws"
115
+ }
116
+ ],
117
+ "Checks": [
118
+ "codeartifact_packages_external_public_publishing_disabled",
119
+ "codebuild_project_uses_allowed_github_organizations",
120
+ "codebuild_project_source_repo_url_no_sensitive_credentials",
121
+ "codebuild_project_user_controlled_buildspec",
122
+ "codebuild_project_no_secrets_in_variables"
123
+ ]
124
+ },
125
+ {
126
+ "Id": "sc_2",
127
+ "Name": "GV.SC-2",
128
+ "Description": "Supply chain risk management processes are established, managed, and agreed to by organizational stakeholders.",
129
+ "Attributes": [
130
+ {
131
+ "ItemId": "sc_2",
132
+ "Section": "Govern (GV)",
133
+ "SubSection": "Cybersecurity Supply Chain Risk Management (GV.SC)",
134
+ "Service": "aws"
135
+ }
136
+ ],
137
+ "Checks": [
138
+ "codeartifact_packages_external_public_publishing_disabled",
139
+ "codebuild_project_uses_allowed_github_organizations"
140
+ ]
141
+ },
142
+ {
143
+ "Id": "sc_3",
144
+ "Name": "GV.SC-3",
145
+ "Description": "Suppliers and third-party partners are evaluated, assessed, and monitored using cybersecurity supply chain risk management processes.",
146
+ "Attributes": [
147
+ {
148
+ "ItemId": "sc_3",
149
+ "Section": "Govern (GV)",
150
+ "SubSection": "Cybersecurity Supply Chain Risk Management (GV.SC)",
151
+ "Service": "aws"
152
+ }
153
+ ],
154
+ "Checks": [
155
+ "codeartifact_packages_external_public_publishing_disabled",
156
+ "codebuild_project_user_controlled_buildspec",
157
+ "codebuild_project_source_repo_url_no_sensitive_credentials",
158
+ "codebuild_project_uses_allowed_github_organizations"
159
+ ]
160
+ },
161
+ {
162
+ "Id": "sc_4",
163
+ "Name": "GV.SC-4",
164
+ "Description": "Supply chain risk management processes are continuously improved.",
165
+ "Attributes": [
166
+ {
167
+ "ItemId": "sc_4",
168
+ "Section": "Govern (GV)",
169
+ "SubSection": "Cybersecurity Supply Chain Risk Management (GV.SC)",
170
+ "Service": "aws"
171
+ }
172
+ ],
173
+ "Checks": []
174
+ },
175
+ {
176
+ "Id": "rr_1",
177
+ "Name": "GV.RR-1",
178
+ "Description": "Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners.",
179
+ "Attributes": [
180
+ {
181
+ "ItemId": "rr_1",
182
+ "Section": "Govern (GV)",
183
+ "SubSection": "Roles, Responsibilities, and Authorities (GV.RR)",
184
+ "Service": "iam"
185
+ }
186
+ ],
187
+ "Checks": [
188
+ "organizations_account_part_of_organizations",
189
+ "organizations_delegated_administrators",
190
+ "organizations_scp_check_deny_regions",
191
+ "organizations_opt_out_ai_services_policy",
192
+ "vpc_endpoint_connections_trust_boundaries",
193
+ "iam_role_administratoraccess_policy",
194
+ "iam_group_administrator_access_policy",
195
+ "iam_user_administrator_access_policy",
196
+ "iam_policy_attached_only_to_group_or_roles",
197
+ "iam_policy_allows_privilege_escalation",
198
+ "iam_inline_policy_allows_privilege_escalation",
199
+ "iam_inline_policy_no_full_access_to_kms",
200
+ "iam_inline_policy_no_administrative_privileges",
201
+ "iam_policy_no_full_access_to_cloudtrail",
202
+ "iam_policy_no_full_access_to_kms",
203
+ "iam_customer_attached_policy_no_administrative_privileges",
204
+ "iam_administrator_access_with_mfa",
205
+ "iam_root_mfa_enabled",
206
+ "iam_root_credentials_management_enabled",
207
+ "iam_no_custom_policy_permissive_role_assumption",
208
+ "iam_aws_attached_policy_no_administrative_privileges"
209
+ ]
210
+ },
211
+ {
212
+ "Id": "rr_2",
213
+ "Name": "GV.RR-2",
214
+ "Description": "Cybersecurity responsibilities are established and communicated.",
215
+ "Attributes": [
216
+ {
217
+ "ItemId": "rr_2",
218
+ "Section": "Govern (GV)",
219
+ "SubSection": "Roles, Responsibilities, and Authorities (GV.RR)",
220
+ "Service": "iam"
221
+ }
222
+ ],
223
+ "Checks": [
224
+ "iam_group_administrator_access_policy",
225
+ "iam_role_administratoraccess_policy",
226
+ "iam_user_administrator_access_policy",
227
+ "iam_customer_attached_policy_no_administrative_privileges",
228
+ "iam_inline_policy_no_administrative_privileges",
229
+ "iam_policy_allows_privilege_escalation",
230
+ "iam_inline_policy_allows_privilege_escalation",
231
+ "iam_policy_attached_only_to_group_or_roles",
232
+ "iam_aws_attached_policy_no_administrative_privileges",
233
+ "organizations_account_part_of_organizations",
234
+ "organizations_delegated_administrators",
235
+ "organizations_opt_out_ai_services_policy",
236
+ "organizations_scp_check_deny_regions",
237
+ "iam_root_credentials_management_enabled",
238
+ "iam_role_cross_account_readonlyaccess_policy"
239
+ ]
240
+ },
241
+ {
242
+ "Id": "rr_3",
243
+ "Name": "GV.RR-3",
244
+ "Description": "Senior executives are accountable for cybersecurity risk.",
245
+ "Attributes": [
246
+ {
247
+ "ItemId": "rr_3",
248
+ "Section": "Govern (GV)",
249
+ "SubSection": "Roles, Responsibilities, and Authorities (GV.RR)",
250
+ "Service": "aws"
251
+ }
252
+ ],
253
+ "Checks": []
254
+ },
255
+ {
256
+ "Id": "po_1",
257
+ "Name": "GV.PO-1",
258
+ "Description": "Cybersecurity policy is established, communicated, and enforced.",
259
+ "Attributes": [
260
+ {
261
+ "ItemId": "po_1",
262
+ "Section": "Govern (GV)",
263
+ "SubSection": "Policies, Processes, and Procedures (GV.PO)",
264
+ "Service": "aws"
265
+ }
266
+ ],
267
+ "Checks": [
268
+ "iam_policy_attached_only_to_group_or_roles",
269
+ "iam_policy_allows_privilege_escalation",
270
+ "iam_inline_policy_allows_privilege_escalation",
271
+ "iam_inline_policy_no_full_access_to_cloudtrail",
272
+ "iam_inline_policy_no_full_access_to_kms",
273
+ "iam_inline_policy_no_administrative_privileges",
274
+ "iam_policy_no_full_access_to_cloudtrail",
275
+ "iam_policy_no_full_access_to_kms",
276
+ "iam_customer_attached_policy_no_administrative_privileges",
277
+ "iam_customer_unattached_policy_no_administrative_privileges",
278
+ "iam_group_administrator_access_policy",
279
+ "iam_user_administrator_access_policy",
280
+ "iam_role_administratoraccess_policy",
281
+ "iam_aws_attached_policy_no_administrative_privileges",
282
+ "iam_no_custom_policy_permissive_role_assumption"
283
+ ]
284
+ },
285
+ {
286
+ "Id": "po_2",
287
+ "Name": "GV.PO-2",
288
+ "Description": "Cybersecurity policy is updated as needed to reflect changes in organizational priorities, threat landscape, or technology.",
289
+ "Attributes": [
290
+ {
291
+ "ItemId": "po_2",
292
+ "Section": "Govern (GV)",
293
+ "SubSection": "Policies, Processes, and Procedures (GV.PO)",
294
+ "Service": "aws"
295
+ }
296
+ ],
297
+ "Checks": []
298
+ },
299
+ {
300
+ "Id": "po_3",
301
+ "Name": "GV.PO-3",
302
+ "Description": "Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed.",
303
+ "Attributes": [
304
+ {
305
+ "ItemId": "po_3",
306
+ "Section": "Govern (GV)",
307
+ "SubSection": "Policies, Processes, and Procedures (GV.PO)",
308
+ "Service": "aws"
309
+ }
310
+ ],
311
+ "Checks": [
312
+ "securityhub_enabled",
313
+ "config_recorder_all_regions_enabled",
314
+ "organizations_account_part_of_organizations",
315
+ "organizations_opt_out_ai_services_policy",
316
+ "trustedadvisor_premium_support_plan_subscribed",
317
+ "trustedadvisor_errors_and_warnings",
318
+ "accessanalyzer_enabled",
319
+ "vpc_endpoint_connections_trust_boundaries",
320
+ "organizations_scp_check_deny_regions",
321
+ "servicecatalog_portfolio_shared_within_organization_only",
322
+ "wellarchitected_workload_no_high_or_medium_risks",
323
+ "organizations_delegated_administrators",
324
+ "organizations_tags_policies_enabled_and_attached"
325
+ ]
326
+ },
327
+ {
328
+ "Id": "po_4",
329
+ "Name": "GV.PO-4",
330
+ "Description": "Governance and risk management processes address cybersecurity risks.",
331
+ "Attributes": [
332
+ {
333
+ "ItemId": "po_4",
334
+ "Section": "Govern (GV)",
335
+ "SubSection": "Policies, Processes, and Procedures (GV.PO)",
336
+ "Service": "aws"
337
+ }
338
+ ],
339
+ "Checks": [
340
+ "config_recorder_all_regions_enabled",
341
+ "config_recorder_using_aws_service_role",
342
+ "accessanalyzer_enabled",
343
+ "cloudtrail_threat_detection_enumeration",
344
+ "cloudtrail_threat_detection_privilege_escalation",
345
+ "cloudtrail_threat_detection_llm_jacking",
346
+ "cloudtrail_multi_region_enabled_logging_management_events",
347
+ "organizations_scp_check_deny_regions",
348
+ "organizations_account_part_of_organizations",
349
+ "trustedadvisor_premium_support_plan_subscribed",
350
+ "trustedadvisor_errors_and_warnings",
351
+ "securityhub_enabled",
352
+ "vpc_flow_logs_enabled",
353
+ "iam_root_mfa_enabled",
354
+ "iam_root_credentials_management_enabled"
355
+ ]
356
+ },
357
+ {
358
+ "Id": "po_5",
359
+ "Name": "GV.PO-5",
360
+ "Description": "Processes for managing cybersecurity requirements for suppliers and third-party partners are established.",
361
+ "Attributes": [
362
+ {
363
+ "ItemId": "po_5",
364
+ "Section": "Govern (GV)",
365
+ "SubSection": "Policies, Processes, and Procedures (GV.PO)",
366
+ "Service": "aws"
367
+ }
368
+ ],
369
+ "Checks": [
370
+ "codeartifact_packages_external_public_publishing_disabled",
371
+ "codebuild_project_uses_allowed_github_organizations",
372
+ "codebuild_project_source_repo_url_no_sensitive_credentials",
373
+ "codebuild_project_user_controlled_buildspec",
374
+ "codebuild_project_no_secrets_in_variables"
375
+ ]
376
+ },
377
+ {
378
+ "Id": "ov_1",
379
+ "Name": "GV.OV-1",
380
+ "Description": "Cybersecurity risk management strategy outcomes are reviewed to inform and adjust organizational priorities.",
381
+ "Attributes": [
382
+ {
383
+ "ItemId": "ov_1",
384
+ "Section": "Govern (GV)",
385
+ "SubSection": "Oversight (GV.OV)",
386
+ "Service": "aws"
387
+ }
388
+ ],
389
+ "Checks": []
390
+ },
391
+ {
392
+ "Id": "ov_2",
393
+ "Name": "GV.OV-2",
394
+ "Description": "Cybersecurity risk management performance is measured and reported.",
395
+ "Attributes": [
396
+ {
397
+ "ItemId": "ov_2",
398
+ "Section": "Govern (GV)",
399
+ "SubSection": "Oversight (GV.OV)",
400
+ "Service": "aws"
401
+ }
402
+ ],
403
+ "Checks": [
404
+ "accessanalyzer_enabled_without_findings",
405
+ "wellarchitected_workload_no_high_or_medium_risks",
406
+ "securityhub_enabled",
407
+ "inspector2_active_findings_exist",
408
+ "accessanalyzer_enabled",
409
+ "guardduty_no_high_severity_findings",
410
+ "trustedadvisor_errors_and_warnings"
411
+ ]
412
+ },
413
+ {
414
+ "Id": "ov_3",
415
+ "Name": "GV.OV-3",
416
+ "Description": "Cybersecurity risk management strategy and practices are reviewed and adjusted to adapt to changes in the threat landscape, technologies, or mission, business, or system environments.",
417
+ "Attributes": [
418
+ {
419
+ "ItemId": "ov_3",
420
+ "Section": "Govern (GV)",
421
+ "SubSection": "Oversight (GV.OV)",
422
+ "Service": "aws"
423
+ }
424
+ ],
425
+ "Checks": [
426
+ "config_recorder_all_regions_enabled",
427
+ "config_recorder_using_aws_service_role",
428
+ "accessanalyzer_enabled",
429
+ "securityhub_enabled",
430
+ "trustedadvisor_premium_support_plan_subscribed",
431
+ "trustedadvisor_errors_and_warnings",
432
+ "cloudtrail_multi_region_enabled_logging_management_events",
433
+ "cloudtrail_threat_detection_enumeration",
434
+ "cloudtrail_threat_detection_privilege_escalation",
435
+ "cloudtrail_threat_detection_llm_jacking",
436
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
437
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
438
+ "cloudwatch_log_metric_filter_policy_changes",
439
+ "cloudwatch_log_metric_filter_security_group_changes",
440
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
441
+ "vpc_endpoint_connections_trust_boundaries",
442
+ "organizations_scp_check_deny_regions",
443
+ "organizations_tags_policies_enabled_and_attached",
444
+ "organizations_delegated_administrators"
445
+ ]
446
+ },
447
+ {
448
+ "Id": "ov_4",
449
+ "Name": "GV.OV-4",
450
+ "Description": "Cybersecurity risk management processes are reviewed to ensure they meet legal and regulatory requirements.",
451
+ "Attributes": [
452
+ {
453
+ "ItemId": "ov_4",
454
+ "Section": "Govern (GV)",
455
+ "SubSection": "Oversight (GV.OV)",
456
+ "Service": "aws"
457
+ }
458
+ ],
459
+ "Checks": []
460
+ },
461
+ {
462
+ "Id": "am_1",
463
+ "Name": "ID.AM-1",
464
+ "Description": "Physical devices and systems within the organization are inventoried.",
465
+ "Attributes": [
466
+ {
467
+ "ItemId": "am_1",
468
+ "Section": "Identify (ID)",
469
+ "SubSection": "Asset Management (ID.AM)",
470
+ "Service": "aws"
471
+ }
472
+ ],
473
+ "Checks": []
474
+ },
475
+ {
476
+ "Id": "am_2",
477
+ "Name": "ID.AM-2",
478
+ "Description": "Software platforms and applications within the organization are inventoried.",
479
+ "Attributes": [
480
+ {
481
+ "ItemId": "am_2",
482
+ "Section": "Identify (ID)",
483
+ "SubSection": "Asset Management (ID.AM)",
484
+ "Service": "aws"
485
+ }
486
+ ],
487
+ "Checks": []
488
+ },
489
+ {
490
+ "Id": "am_3",
491
+ "Name": "ID.AM-3",
492
+ "Description": "Organizational communication and data flows are mapped.",
493
+ "Attributes": [
494
+ {
495
+ "ItemId": "am_3",
496
+ "Section": "Identify (ID)",
497
+ "SubSection": "Asset Management (ID.AM)",
498
+ "Service": "aws"
499
+ }
500
+ ],
501
+ "Checks": []
502
+ },
503
+ {
504
+ "Id": "am_5",
505
+ "Name": "ID.AM-5",
506
+ "Description": "Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value.",
507
+ "Attributes": [
508
+ {
509
+ "ItemId": "am_5",
510
+ "Section": "Identify (ID)",
511
+ "SubSection": "Asset Management (ID.AM)",
512
+ "Service": "aws"
513
+ }
514
+ ],
515
+ "Checks": []
516
+ },
517
+ {
518
+ "Id": "am_6",
519
+ "Name": "ID.AM-6",
520
+ "Description": "Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established.",
521
+ "Attributes": [
522
+ {
523
+ "ItemId": "am_6",
524
+ "Section": "Identify (ID)",
525
+ "SubSection": "Asset Management (ID.AM)",
526
+ "Service": "iam"
527
+ }
528
+ ],
529
+ "Checks": [
530
+ "organizations_account_part_of_organizations",
531
+ "organizations_delegated_administrators",
532
+ "iam_group_administrator_access_policy",
533
+ "iam_policy_attached_only_to_group_or_roles",
534
+ "iam_user_administrator_access_policy",
535
+ "iam_role_cross_account_readonlyaccess_policy"
536
+ ]
537
+ },
538
+ {
539
+ "Id": "be_5",
540
+ "Name": "ID.BE-5",
541
+ "Description": "Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations)",
542
+ "Attributes": [
543
+ {
544
+ "ItemId": "be_5",
545
+ "Section": "Identify (ID)",
546
+ "SubSection": "Business Environment (ID.BE)",
547
+ "Service": "aws"
548
+ }
549
+ ],
550
+ "Checks": [
551
+ "drs_job_exist",
552
+ "backup_vaults_exist",
553
+ "backup_vaults_encrypted",
554
+ "backup_reportplans_exist",
555
+ "rds_cluster_protected_by_backup_plan",
556
+ "rds_instance_protected_by_backup_plan",
557
+ "dynamodb_table_protected_by_backup_plan",
558
+ "s3_bucket_cross_region_replication",
559
+ "autoscaling_group_capacity_rebalance_enabled",
560
+ "autoscaling_group_multiple_az",
561
+ "vpc_endpoint_multi_az_enabled",
562
+ "directconnect_connection_redundancy",
563
+ "directconnect_virtual_interface_redundancy",
564
+ "vpc_subnet_different_az",
565
+ "vpc_subnet_no_public_ip_by_default",
566
+ "vpc_subnet_separate_private_public",
567
+ "elbv2_cross_zone_load_balancing_enabled",
568
+ "elb_cross_zone_load_balancing_enabled",
569
+ "efs_encryption_at_rest_enabled",
570
+ "firehose_stream_encrypted_at_rest",
571
+ "glue_ml_transform_encrypted_at_rest",
572
+ "kafka_cluster_encryption_at_rest_uses_cmk",
573
+ "kinesis_stream_encrypted_at_rest",
574
+ "opensearch_service_domains_encryption_at_rest_enabled",
575
+ "redshift_cluster_encrypted_at_rest",
576
+ "sns_topics_kms_encryption_at_rest_enabled"
577
+ ]
578
+ },
579
+ {
580
+ "Id": "ra_1",
581
+ "Name": "ID.RA-1",
582
+ "Description": "Asset vulnerabilities are identified and documented.",
583
+ "Attributes": [
584
+ {
585
+ "ItemId": "ra_1",
586
+ "Section": "Identify (ID)",
587
+ "SubSection": "Risk Assessment (ID.RA)",
588
+ "Service": "aws"
589
+ }
590
+ ],
591
+ "Checks": [
592
+ "acm_certificates_with_secure_key_algorithms",
593
+ "acm_certificates_expiration_check",
594
+ "awslambda_function_no_secrets_in_variables",
595
+ "awslambda_function_no_secrets_in_code",
596
+ "cloudtrail_threat_detection_llm_jacking",
597
+ "cloudtrail_threat_detection_privilege_escalation",
598
+ "ecr_repositories_not_publicly_accessible",
599
+ "rds_snapshots_public_access",
600
+ "route53_dangling_ip_subdomain_takeover",
601
+ "secretsmanager_not_publicly_accessible",
602
+ "s3_bucket_public_access",
603
+ "s3_bucket_public_write_acl",
604
+ "s3_bucket_cross_account_access",
605
+ "ssm_document_secrets",
606
+ "kms_cmk_not_deleted_unintentionally",
607
+ "kms_cmk_not_multi_region",
608
+ "glacier_vaults_policy_public_access",
609
+ "iam_policy_allows_privilege_escalation",
610
+ "iam_inline_policy_allows_privilege_escalation",
611
+ "ssm_documents_set_as_public",
612
+ "s3_bucket_shadow_resource_vulnerability"
613
+ ]
614
+ },
615
+ {
616
+ "Id": "ra_2",
617
+ "Name": "ID.RA-2",
618
+ "Description": "Cyber threat intelligence is received from information sharing forums and sources.",
619
+ "Attributes": [
620
+ {
621
+ "ItemId": "ra_2",
622
+ "Section": "Identify (ID)",
623
+ "SubSection": "Risk Assessment (ID.RA)",
624
+ "Service": "aws"
625
+ }
626
+ ],
627
+ "Checks": []
628
+ },
629
+ {
630
+ "Id": "ra_3",
631
+ "Name": "ID.RA-3",
632
+ "Description": "Threats, both internal and external, are identified and documented.",
633
+ "Attributes": [
634
+ {
635
+ "ItemId": "ra_3",
636
+ "Section": "Identify (ID)",
637
+ "SubSection": "Risk Assessment (ID.RA)",
638
+ "Service": "aws"
639
+ }
640
+ ],
641
+ "Checks": [
642
+ "cloudtrail_threat_detection_llm_jacking",
643
+ "cloudtrail_threat_detection_enumeration",
644
+ "cloudtrail_threat_detection_privilege_escalation"
645
+ ]
646
+ },
647
+ {
648
+ "Id": "ra_5",
649
+ "Name": "ID.RA-5",
650
+ "Description": "Threats, vulnerabilities, likelihoods, and impacts are used to determine risk.",
651
+ "Attributes": [
652
+ {
653
+ "ItemId": "ra_5",
654
+ "Section": "Identify (ID)",
655
+ "SubSection": "Risk Assessment (ID.RA)",
656
+ "Service": "aws"
657
+ }
658
+ ],
659
+ "Checks": [
660
+ "cloudtrail_threat_detection_llm_jacking",
661
+ "cloudtrail_threat_detection_enumeration",
662
+ "cloudtrail_threat_detection_privilege_escalation",
663
+ "cloudwatch_log_metric_filter_authentication_failures",
664
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
665
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
666
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
667
+ "cloudwatch_changes_to_network_gateways_alarm_configured",
668
+ "cloudwatch_changes_to_network_acls_alarm_configured",
669
+ "cloudwatch_changes_to_vpcs_alarm_configured",
670
+ "eventbridge_bus_cross_account_access",
671
+ "eventbridge_bus_exposed",
672
+ "route53_dangling_ip_subdomain_takeover",
673
+ "vpc_endpoint_connections_trust_boundaries",
674
+ "vpc_peering_routing_tables_with_least_privilege",
675
+ "vpc_endpoint_for_ec2_enabled"
676
+ ]
677
+ },
678
+ {
679
+ "Id": "id_sc_4",
680
+ "Name": "ID.SC-4",
681
+ "Description": "Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.",
682
+ "Attributes": [
683
+ {
684
+ "ItemId": "id_sc_4",
685
+ "Section": "Identify (ID)",
686
+ "SubSection": "Supply Chain Risk Management (ID.SC)",
687
+ "Service": "aws"
688
+ }
689
+ ],
690
+ "Checks": []
691
+ },
692
+ {
693
+ "Id": "ac_1",
694
+ "Name": "PR.AC-1",
695
+ "Description": "Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes.",
696
+ "Attributes": [
697
+ {
698
+ "ItemId": "ac_1",
699
+ "Section": "Protect (PR)",
700
+ "SubSection": "Identity Management and Access Control (PR.AC)",
701
+ "Service": "aws"
702
+ }
703
+ ],
704
+ "Checks": [
705
+ "iam_root_mfa_enabled",
706
+ "iam_no_root_access_key",
707
+ "iam_user_console_access_unused",
708
+ "iam_user_accesskey_unused",
709
+ "iam_user_two_active_access_key",
710
+ "iam_root_credentials_management_enabled",
711
+ "accessanalyzer_enabled",
712
+ "cognito_user_pool_mfa_enabled",
713
+ "cognito_user_pool_password_policy_symbol",
714
+ "cognito_user_pool_password_policy_uppercase",
715
+ "cognito_user_pool_password_policy_lowercase",
716
+ "cognito_user_pool_password_policy_minimum_length_14",
717
+ "iam_policy_allows_privilege_escalation",
718
+ "iam_inline_policy_allows_privilege_escalation",
719
+ "iam_policy_attached_only_to_group_or_roles",
720
+ "iam_aws_attached_policy_no_administrative_privileges",
721
+ "iam_customer_attached_policy_no_administrative_privileges",
722
+ "iam_group_administrator_access_policy",
723
+ "iam_role_administratoraccess_policy",
724
+ "iam_policy_no_full_access_to_cloudtrail",
725
+ "iam_policy_no_full_access_to_kms"
726
+ ]
727
+ },
728
+ {
729
+ "Id": "ac_3",
730
+ "Name": "PR.AC-3",
731
+ "Description": "Remote access is managed.",
732
+ "Attributes": [
733
+ {
734
+ "ItemId": "ac_3",
735
+ "Section": "Protect (PR)",
736
+ "SubSection": "Identity Management and Access Control (PR.AC)",
737
+ "Service": "aws"
738
+ }
739
+ ],
740
+ "Checks": [
741
+ "ec2_securitygroup_allow_ingress_from_internet_to_all_ports",
742
+ "ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22",
743
+ "ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389",
744
+ "ec2_instance_port_ssh_exposed_to_internet",
745
+ "ec2_instance_port_rdp_exposed_to_internet",
746
+ "ec2_instance_port_telnet_exposed_to_internet",
747
+ "ec2_instance_imdsv2_enabled",
748
+ "ec2_launch_template_imdsv2_required",
749
+ "ec2_instance_managed_by_ssm",
750
+ "ssm_managed_compliant_patching",
751
+ "rds_instance_no_public_access",
752
+ "dms_instance_no_public_access",
753
+ "ec2_ebs_snapshot_account_block_public_access",
754
+ "glacier_vaults_policy_public_access",
755
+ "rds_snapshots_public_access",
756
+ "redshift_cluster_public_access",
757
+ "s3_access_point_public_access_block",
758
+ "s3_account_level_public_access_blocks",
759
+ "s3_bucket_level_public_access_block",
760
+ "s3_bucket_public_access",
761
+ "s3_multi_region_access_point_public_access_block"
762
+ ]
763
+ },
764
+ {
765
+ "Id": "ac_4",
766
+ "Name": "PR.AC-4",
767
+ "Description": "Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties.",
768
+ "Attributes": [
769
+ {
770
+ "ItemId": "ac_4",
771
+ "Section": "Protect (PR)",
772
+ "SubSection": "Identity Management and Access Control (PR.AC)",
773
+ "Service": "aws"
774
+ }
775
+ ],
776
+ "Checks": [
777
+ "iam_administrator_access_with_mfa",
778
+ "iam_group_administrator_access_policy",
779
+ "iam_user_administrator_access_policy",
780
+ "iam_role_administratoraccess_policy",
781
+ "iam_policy_attached_only_to_group_or_roles",
782
+ "iam_policy_allows_privilege_escalation",
783
+ "iam_inline_policy_allows_privilege_escalation",
784
+ "iam_customer_attached_policy_no_administrative_privileges",
785
+ "iam_customer_unattached_policy_no_administrative_privileges",
786
+ "accessanalyzer_enabled_without_findings",
787
+ "eventbridge_bus_cross_account_access",
788
+ "eventbridge_bus_exposed",
789
+ "iam_policy_no_full_access_to_cloudtrail",
790
+ "iam_policy_no_full_access_to_kms"
791
+ ]
792
+ },
793
+ {
794
+ "Id": "ac_5",
795
+ "Name": "PR.AC-5",
796
+ "Description": "Network integrity is protected (e.g., network segregation, network segmentation).",
797
+ "Attributes": [
798
+ {
799
+ "ItemId": "ac_5",
800
+ "Section": "Protect (PR)",
801
+ "SubSection": "Identity Management and Access Control (PR.AC)",
802
+ "Service": "aws"
803
+ }
804
+ ],
805
+ "Checks": [
806
+ "vpc_subnet_different_az",
807
+ "vpc_subnet_separate_private_public",
808
+ "vpc_endpoint_connections_trust_boundaries",
809
+ "vpc_peering_routing_tables_with_least_privilege",
810
+ "ec2_networkacl_unused",
811
+ "ec2_securitygroup_default_restrict_traffic",
812
+ "ec2_securitygroup_not_used",
813
+ "ec2_securitygroup_allow_ingress_from_internet_to_all_ports",
814
+ "ec2_securitygroup_allow_ingress_from_internet_to_high_risk_tcp_ports",
815
+ "ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389",
816
+ "ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mongodb_27017_27018",
817
+ "ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483",
818
+ "ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432",
819
+ "ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601"
820
+ ]
821
+ },
822
+ {
823
+ "Id": "ac_6",
824
+ "Name": "PR.AC-6",
825
+ "Description": "Identities are proofed and bound to credentials and asserted in interactions.",
826
+ "Attributes": [
827
+ {
828
+ "ItemId": "ac_6",
829
+ "Section": "Protect (PR)",
830
+ "SubSection": "Identity Management and Access Control (PR.AC)",
831
+ "Service": "aws"
832
+ }
833
+ ],
834
+ "Checks": [
835
+ "iam_root_mfa_enabled",
836
+ "iam_no_root_access_key",
837
+ "iam_rotate_access_key_90_days",
838
+ "iam_user_two_active_access_key",
839
+ "iam_user_with_temporary_credentials",
840
+ "iam_policy_attached_only_to_group_or_roles",
841
+ "iam_group_administrator_access_policy",
842
+ "iam_role_cross_account_readonlyaccess_policy",
843
+ "iam_policy_allows_privilege_escalation",
844
+ "iam_inline_policy_allows_privilege_escalation",
845
+ "iam_customer_attached_policy_no_administrative_privileges",
846
+ "iam_customer_unattached_policy_no_administrative_privileges",
847
+ "accessanalyzer_enabled",
848
+ "cognito_user_pool_password_policy_symbol"
849
+ ]
850
+ },
851
+ {
852
+ "Id": "ac_7",
853
+ "Name": "PR.AC-7",
854
+ "Description": "Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals' security and privacy risks and other organizational risks).",
855
+ "Attributes": [
856
+ {
857
+ "ItemId": "ac_7",
858
+ "Section": "Protect (PR)",
859
+ "SubSection": "Identity Management and Access Control (PR.AC)",
860
+ "Service": "iam"
861
+ }
862
+ ],
863
+ "Checks": [
864
+ "iam_root_mfa_enabled",
865
+ "iam_user_mfa_enabled_console_access",
866
+ "cognito_user_pool_password_policy_symbol",
867
+ "cognito_user_pool_password_policy_number",
868
+ "cognito_user_pool_password_policy_lowercase",
869
+ "cognito_user_pool_password_policy_uppercase",
870
+ "cognito_user_pool_password_policy_minimum_length_14",
871
+ "cognito_user_pool_mfa_enabled",
872
+ "cognito_identity_pool_guest_access_disabled",
873
+ "apigatewayv2_api_authorizers_enabled",
874
+ "apigateway_restapi_authorizers_enabled",
875
+ "apigateway_restapi_public_with_authorizer",
876
+ "awslambda_function_not_publicly_accessible",
877
+ "awslambda_function_url_public",
878
+ "iam_policy_attached_only_to_group_or_roles",
879
+ "iam_inline_policy_allows_privilege_escalation",
880
+ "iam_inline_policy_no_full_access_to_cloudtrail",
881
+ "iam_policy_allows_privilege_escalation",
882
+ "iam_check_saml_providers_sts"
883
+ ]
884
+ },
885
+ {
886
+ "Id": "ds_1",
887
+ "Name": "PR.DS-1",
888
+ "Description": "Data-at-rest is protected.",
889
+ "Attributes": [
890
+ {
891
+ "ItemId": "ds_1",
892
+ "Section": "Protect (PR)",
893
+ "SubSection": "Data Security (PR.DS)",
894
+ "Service": "aws"
895
+ }
896
+ ],
897
+ "Checks": [
898
+ "backup_vaults_encrypted",
899
+ "backup_recovery_point_encrypted",
900
+ "cloudtrail_kms_encryption_enabled",
901
+ "cloudwatch_log_group_kms_encryption_enabled",
902
+ "s3_bucket_kms_encryption",
903
+ "s3_bucket_default_encryption",
904
+ "efs_encryption_at_rest_enabled",
905
+ "dynamodb_tables_kms_cmk_encryption_enabled",
906
+ "rds_instance_storage_encrypted",
907
+ "rds_snapshots_encrypted",
908
+ "redshift_cluster_encrypted_at_rest",
909
+ "elasticache_redis_cluster_rest_encryption_enabled",
910
+ "neptune_cluster_storage_encrypted",
911
+ "opensearch_service_domains_encryption_at_rest_enabled",
912
+ "opensearch_service_domains_node_to_node_encryption_enabled",
913
+ "glue_data_catalogs_metadata_encryption_enabled",
914
+ "glue_data_catalogs_connection_passwords_encryption_enabled",
915
+ "glue_etl_jobs_amazon_s3_encryption_enabled",
916
+ "glue_etl_jobs_cloudwatch_logs_encryption_enabled",
917
+ "glue_etl_jobs_job_bookmark_encryption_enabled",
918
+ "kinesis_stream_encrypted_at_rest",
919
+ "firehose_stream_encrypted_at_rest",
920
+ "storagegateway_fileshare_encryption_enabled"
921
+ ]
922
+ },
923
+ {
924
+ "Id": "ds_2",
925
+ "Name": "PR.DS-2",
926
+ "Description": "Data-in-transit is protected.",
927
+ "Attributes": [
928
+ {
929
+ "ItemId": "ds_2",
930
+ "Section": "Protect (PR)",
931
+ "SubSection": "Data Security (PR.DS)",
932
+ "Service": "aws"
933
+ }
934
+ ],
935
+ "Checks": [
936
+ "elasticache_redis_cluster_in_transit_encryption_enabled",
937
+ "cloudfront_distributions_origin_traffic_encrypted",
938
+ "cloudfront_distributions_https_enabled",
939
+ "s3_bucket_secure_transport_policy",
940
+ "rds_instance_transport_encrypted",
941
+ "transfer_server_in_transit_encryption_enabled",
942
+ "kafka_cluster_in_transit_encryption_enabled",
943
+ "kafka_connector_in_transit_encryption_enabled",
944
+ "dms_endpoint_ssl_enabled",
945
+ "dms_endpoint_redis_in_transit_encryption_enabled",
946
+ "opensearch_service_domains_https_communications_enforced",
947
+ "opensearch_service_domains_node_to_node_encryption_enabled"
948
+ ]
949
+ },
950
+ {
951
+ "Id": "ds_3",
952
+ "Name": "PR.DS-3",
953
+ "Description": "Assets are formally managed throughout removal, transfers, and disposition.",
954
+ "Attributes": [
955
+ {
956
+ "ItemId": "ds_3",
957
+ "Section": "Protect (PR)",
958
+ "SubSection": "Data Security (PR.DS)",
959
+ "Service": "aws"
960
+ }
961
+ ],
962
+ "Checks": [
963
+ "dynamodb_table_deletion_protection_enabled",
964
+ "eks_cluster_deletion_protection_enabled",
965
+ "rds_cluster_deletion_protection",
966
+ "elbv2_deletion_protection",
967
+ "cloudtrail_bucket_requires_mfa_delete",
968
+ "kms_cmk_not_deleted_unintentionally",
969
+ "dlm_ebs_snapshot_lifecycle_policy_exists",
970
+ "backup_vaults_encrypted",
971
+ "backup_vaults_exist",
972
+ "backup_reportplans_exist",
973
+ "backup_recovery_point_encrypted",
974
+ "rds_instance_backup_enabled",
975
+ "rds_cluster_protected_by_backup_plan",
976
+ "ec2_ebs_volume_protected_by_backup_plan",
977
+ "s3_bucket_lifecycle_enabled",
978
+ "s3_bucket_default_encryption",
979
+ "s3_bucket_kms_encryption"
980
+ ]
981
+ },
982
+ {
983
+ "Id": "ds_4",
984
+ "Name": "PR.DS-4",
985
+ "Description": "Adequate capacity to ensure availability is maintained.",
986
+ "Attributes": [
987
+ {
988
+ "ItemId": "ds_4",
989
+ "Section": "Protect (PR)",
990
+ "SubSection": "Data Security (PR.DS)",
991
+ "Service": "aws"
992
+ }
993
+ ],
994
+ "Checks": [
995
+ "dynamodb_table_deletion_protection_enabled",
996
+ "dynamodb_table_protected_by_backup_plan",
997
+ "eks_cluster_deletion_protection_enabled",
998
+ "rds_instance_multi_az",
999
+ "rds_instance_backup_enabled",
1000
+ "rds_cluster_deletion_protection",
1001
+ "rds_instance_deletion_protection",
1002
+ "redshift_cluster_multi_az_enabled",
1003
+ "dynamodb_table_autoscaling_enabled",
1004
+ "autoscaling_group_capacity_rebalance_enabled",
1005
+ "autoscaling_group_multiple_az",
1006
+ "elb_cross_zone_load_balancing_enabled",
1007
+ "elbv2_cross_zone_load_balancing_enabled",
1008
+ "elb_is_in_multiple_az",
1009
+ "directconnect_connection_redundancy",
1010
+ "s3_bucket_cross_region_replication",
1011
+ "s3_bucket_lifecycle_enabled",
1012
+ "backup_plans_exist",
1013
+ "backup_recovery_point_encrypted",
1014
+ "backup_reportplans_exist",
1015
+ "rds_cluster_protected_by_backup_plan",
1016
+ "rds_instance_protected_by_backup_plan"
1017
+ ]
1018
+ },
1019
+ {
1020
+ "Id": "ds_5",
1021
+ "Name": "PR.DS-5",
1022
+ "Description": "Protections against data leaks are implemented.",
1023
+ "Attributes": [
1024
+ {
1025
+ "ItemId": "ds_5",
1026
+ "Section": "Protect (PR)",
1027
+ "SubSection": "Data Security (PR.DS)",
1028
+ "Service": "aws"
1029
+ }
1030
+ ],
1031
+ "Checks": [
1032
+ "s3_bucket_public_access",
1033
+ "s3_bucket_public_write_acl",
1034
+ "s3_bucket_public_list_acl",
1035
+ "s3_bucket_cross_account_access",
1036
+ "s3_bucket_kms_encryption",
1037
+ "s3_bucket_acl_prohibited",
1038
+ "cloudtrail_logs_s3_bucket_is_not_publicly_accessible",
1039
+ "cloudtrail_kms_encryption_enabled",
1040
+ "cloudwatch_log_group_not_publicly_accessible",
1041
+ "cloudwatch_log_group_kms_encryption_enabled",
1042
+ "secretsmanager_not_publicly_accessible",
1043
+ "ec2_securitygroup_allow_ingress_from_internet_to_all_ports",
1044
+ "ec2_ebs_snapshot_account_block_public_access",
1045
+ "ec2_ebs_public_snapshot",
1046
+ "rds_snapshots_public_access",
1047
+ "ec2_ami_public",
1048
+ "ssm_document_secrets",
1049
+ "ec2_instance_secrets_user_data",
1050
+ "awslambda_function_no_secrets_in_variables",
1051
+ "awslambda_function_no_secrets_in_code"
1052
+ ]
1053
+ },
1054
+ {
1055
+ "Id": "ds_6",
1056
+ "Name": "PR.DS-6",
1057
+ "Description": "Integrity checking mechanisms are used to verify software, firmware, and information integrity.",
1058
+ "Attributes": [
1059
+ {
1060
+ "ItemId": "ds_6",
1061
+ "Section": "Protect (PR)",
1062
+ "SubSection": "Data Security (PR.DS)",
1063
+ "Service": "cloudtrail"
1064
+ }
1065
+ ],
1066
+ "Checks": [
1067
+ "cloudtrail_log_file_validation_enabled"
1068
+ ]
1069
+ },
1070
+ {
1071
+ "Id": "ds_7",
1072
+ "Name": "PR.DS-7",
1073
+ "Description": "The development and testing environment(s) are separate from the production environment.",
1074
+ "Attributes": [
1075
+ {
1076
+ "ItemId": "ds_7",
1077
+ "Section": "Protect (PR)",
1078
+ "SubSection": "Data Security (PR.DS)",
1079
+ "Service": "aws"
1080
+ }
1081
+ ],
1082
+ "Checks": []
1083
+ },
1084
+ {
1085
+ "Id": "ds_8",
1086
+ "Name": "PR.DS-8",
1087
+ "Description": "Integrity checking mechanisms are used to verify hardware integrity.",
1088
+ "Attributes": [
1089
+ {
1090
+ "ItemId": "ds_8",
1091
+ "Section": "Protect (PR)",
1092
+ "SubSection": "Data Security (PR.DS)",
1093
+ "Service": "aws"
1094
+ }
1095
+ ],
1096
+ "Checks": []
1097
+ },
1098
+ {
1099
+ "Id": "ip_1",
1100
+ "Name": "PR.IP-1",
1101
+ "Description": "A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality).",
1102
+ "Attributes": [
1103
+ {
1104
+ "ItemId": "ip_1",
1105
+ "Section": "Protect (PR)",
1106
+ "SubSection": "Information Protection Processes and Procedures (PR.IP)",
1107
+ "Service": "aws"
1108
+ }
1109
+ ],
1110
+ "Checks": [
1111
+ "ec2_securitygroup_default_restrict_traffic",
1112
+ "ec2_securitygroup_allow_ingress_from_internet_to_all_ports",
1113
+ "ec2_networkacl_unused",
1114
+ "ec2_securitygroup_not_used",
1115
+ "ec2_instance_public_ip",
1116
+ "iam_root_mfa_enabled",
1117
+ "iam_administrator_access_with_mfa",
1118
+ "iam_policy_attached_only_to_group_or_roles",
1119
+ "iam_inline_policy_allows_privilege_escalation",
1120
+ "iam_policy_allows_privilege_escalation",
1121
+ "s3_bucket_public_access",
1122
+ "s3_bucket_cross_account_access"
1123
+ ]
1124
+ },
1125
+ {
1126
+ "Id": "ip_2",
1127
+ "Name": "PR.IP-2",
1128
+ "Description": "A System Development Life Cycle to manage systems is implemented.",
1129
+ "Attributes": [
1130
+ {
1131
+ "ItemId": "ip_2",
1132
+ "Section": "Protect (PR)",
1133
+ "SubSection": "Information Protection Processes and Procedures (PR.IP)",
1134
+ "Service": "aws"
1135
+ }
1136
+ ],
1137
+ "Checks": [
1138
+ "codepipeline_project_repo_private",
1139
+ "codebuild_project_not_publicly_accessible",
1140
+ "codebuild_project_logging_enabled",
1141
+ "codebuild_project_s3_logs_encrypted",
1142
+ "codebuild_project_uses_allowed_github_organizations",
1143
+ "codebuild_project_source_repo_url_no_sensitive_credentials",
1144
+ "codebuild_project_no_secrets_in_variables",
1145
+ "codebuild_project_user_controlled_buildspec",
1146
+ "codebuild_project_older_90_days"
1147
+ ]
1148
+ },
1149
+ {
1150
+ "Id": "ip_3",
1151
+ "Name": "PR.IP-3",
1152
+ "Description": "Configuration change control processes are in place.",
1153
+ "Attributes": [
1154
+ {
1155
+ "ItemId": "ip_3",
1156
+ "Section": "Protect (PR)",
1157
+ "SubSection": "Information Protection Processes and Procedures (PR.IP)",
1158
+ "Service": "elb"
1159
+ }
1160
+ ],
1161
+ "Checks": []
1162
+ },
1163
+ {
1164
+ "Id": "ip_4",
1165
+ "Name": "PR.IP-4",
1166
+ "Description": "Backups of information are conducted, maintained, and tested periodically.",
1167
+ "Attributes": [
1168
+ {
1169
+ "ItemId": "ip_4",
1170
+ "Section": "Protect (PR)",
1171
+ "SubSection": "Information Protection Processes and Procedures (PR.IP)",
1172
+ "Service": "aws"
1173
+ }
1174
+ ],
1175
+ "Checks": [
1176
+ "backup_vaults_exist",
1177
+ "backup_vaults_encrypted",
1178
+ "backup_recovery_point_encrypted",
1179
+ "backup_reportplans_exist",
1180
+ "backup_plans_exist",
1181
+ "documentdb_cluster_backup_enabled",
1182
+ "dynamodb_table_protected_by_backup_plan",
1183
+ "ec2_ebs_volume_protected_by_backup_plan",
1184
+ "efs_have_backup_enabled",
1185
+ "elasticache_redis_cluster_backup_enabled",
1186
+ "fsx_file_system_copy_tags_to_backups_enabled",
1187
+ "neptune_cluster_backup_enabled",
1188
+ "rds_cluster_protected_by_backup_plan",
1189
+ "rds_instance_backup_enabled",
1190
+ "rds_instance_protected_by_backup_plan"
1191
+ ]
1192
+ },
1193
+ {
1194
+ "Id": "ip_7",
1195
+ "Name": "PR.IP-7",
1196
+ "Description": "Protection processes are improved.",
1197
+ "Attributes": [
1198
+ {
1199
+ "ItemId": "ip_7",
1200
+ "Section": "Protect (PR)",
1201
+ "SubSection": "Information Protection Processes and Procedures (PR.IP)",
1202
+ "Service": "ec2"
1203
+ }
1204
+ ],
1205
+ "Checks": [
1206
+ "cloudtrail_threat_detection_llm_jacking",
1207
+ "cloudtrail_threat_detection_enumeration",
1208
+ "cloudtrail_threat_detection_privilege_escalation",
1209
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
1210
+ "cloudwatch_log_metric_filter_authentication_failures",
1211
+ "cloudwatch_alarm_actions_alarm_state_configured",
1212
+ "guardduty_is_enabled",
1213
+ "guardduty_ec2_malware_protection_enabled",
1214
+ "guardduty_eks_runtime_monitoring_enabled",
1215
+ "inspector2_is_enabled",
1216
+ "inspector2_active_findings_exist",
1217
+ "secretsmanager_automatic_rotation_enabled",
1218
+ "secretsmanager_secret_rotated_periodically"
1219
+ ]
1220
+ },
1221
+ {
1222
+ "Id": "ip_8",
1223
+ "Name": "PR.IP-8",
1224
+ "Description": "Effectiveness of protection technologies is shared.",
1225
+ "Attributes": [
1226
+ {
1227
+ "ItemId": "ip_8",
1228
+ "Section": "Protect (PR)",
1229
+ "SubSection": "Information Protection Processes and Procedures (PR.IP)",
1230
+ "Service": "aws"
1231
+ }
1232
+ ],
1233
+ "Checks": [
1234
+ "cloudtrail_cloudwatch_logging_enabled",
1235
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
1236
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
1237
+ "cloudwatch_alarm_actions_enabled",
1238
+ "cloudwatch_alarm_actions_alarm_state_configured",
1239
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
1240
+ "cloudwatch_log_metric_filter_security_group_changes",
1241
+ "cloudwatch_log_metric_filter_root_usage",
1242
+ "cloudwatch_log_metric_filter_authentication_failures"
1243
+ ]
1244
+ },
1245
+ {
1246
+ "Id": "ip_9",
1247
+ "Name": "PR.IP-9",
1248
+ "Description": "Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed.",
1249
+ "Attributes": [
1250
+ {
1251
+ "ItemId": "ip_9",
1252
+ "Section": "Protect (PR)",
1253
+ "SubSection": "Information Protection Processes and Procedures (PR.IP)",
1254
+ "Service": "aws"
1255
+ }
1256
+ ],
1257
+ "Checks": [
1258
+ "ssmincidents_enabled_with_plans",
1259
+ "drs_job_exist"
1260
+ ]
1261
+ },
1262
+ {
1263
+ "Id": "ip_12",
1264
+ "Name": "PR.IP-12",
1265
+ "Description": "A vulnerability management plan is developed and implemented.",
1266
+ "Attributes": [
1267
+ {
1268
+ "ItemId": "ip_12",
1269
+ "Section": "Protect (PR)",
1270
+ "SubSection": "Information Protection Processes and Procedures (PR.IP)",
1271
+ "Service": "aws"
1272
+ }
1273
+ ],
1274
+ "Checks": [
1275
+ "inspector2_is_enabled",
1276
+ "guardduty_is_enabled",
1277
+ "inspector2_active_findings_exist"
1278
+ ]
1279
+ },
1280
+ {
1281
+ "Id": "ma_2",
1282
+ "Name": "PR.MA-2",
1283
+ "Description": "Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access.",
1284
+ "Attributes": [
1285
+ {
1286
+ "ItemId": "ma_2",
1287
+ "Section": "Protect (PR)",
1288
+ "SubSection": "Maintenance (PR.MA)",
1289
+ "Service": "cloudtrail"
1290
+ }
1291
+ ],
1292
+ "Checks": []
1293
+ },
1294
+ {
1295
+ "Id": "pt_1",
1296
+ "Name": "PR.PT-1",
1297
+ "Description": "Audit/log records are determined, documented, implemented, and reviewed in accordance with policy.",
1298
+ "Attributes": [
1299
+ {
1300
+ "ItemId": "pt_1",
1301
+ "Section": "Protect (PR)",
1302
+ "SubSection": "Protective Technology (PR.PT)",
1303
+ "Service": "aws"
1304
+ }
1305
+ ],
1306
+ "Checks": [
1307
+ "cloudtrail_kms_encryption_enabled",
1308
+ "cloudtrail_log_file_validation_enabled",
1309
+ "cloudtrail_logs_s3_bucket_access_logging_enabled",
1310
+ "cloudtrail_multi_region_enabled_logging_management_events",
1311
+ "cloudtrail_threat_detection_enumeration",
1312
+ "cloudtrail_threat_detection_privilege_escalation",
1313
+ "cloudtrail_threat_detection_llm_jacking",
1314
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
1315
+ "cloudwatch_log_metric_filter_for_s3_bucket_policy_changes",
1316
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
1317
+ "cloudwatch_log_metric_filter_authentication_failures",
1318
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
1319
+ "cloudtrail_logs_s3_bucket_is_not_publicly_accessible",
1320
+ "vpc_flow_logs_enabled",
1321
+ "config_recorder_all_regions_enabled",
1322
+ "config_recorder_using_aws_service_role"
1323
+ ]
1324
+ },
1325
+ {
1326
+ "Id": "pt_3",
1327
+ "Name": "PR.PT-3",
1328
+ "Description": "The principle of least functionality is incorporated by configuring systems to provide only essential capabilities.",
1329
+ "Attributes": [
1330
+ {
1331
+ "ItemId": "pt_3",
1332
+ "Section": "Protect (PR)",
1333
+ "SubSection": "Protective Technology (PR.PT)",
1334
+ "Service": "aws"
1335
+ }
1336
+ ],
1337
+ "Checks": []
1338
+ },
1339
+ {
1340
+ "Id": "pt_4",
1341
+ "Name": "PR.PT-4",
1342
+ "Description": "Communications and control networks are protected.",
1343
+ "Attributes": [
1344
+ {
1345
+ "ItemId": "pt_4",
1346
+ "Section": "Protect (PR)",
1347
+ "SubSection": "Protective Technology (PR.PT)",
1348
+ "Service": "aws"
1349
+ }
1350
+ ],
1351
+ "Checks": [
1352
+ "cloudfront_distributions_https_enabled",
1353
+ "cloudfront_distributions_origin_traffic_encrypted",
1354
+ "vpc_flow_logs_enabled",
1355
+ "ec2_securitygroup_allow_ingress_from_internet_to_all_ports",
1356
+ "apigateway_restapi_public_with_authorizer",
1357
+ "apigateway_restapi_authorizers_enabled",
1358
+ "s3_bucket_secure_transport_policy",
1359
+ "s3_bucket_kms_encryption",
1360
+ "cloudtrail_kms_encryption_enabled"
1361
+ ]
1362
+ },
1363
+ {
1364
+ "Id": "pt_5",
1365
+ "Name": "PR.PT-5",
1366
+ "Description": "Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations.",
1367
+ "Attributes": [
1368
+ {
1369
+ "ItemId": "pt_5",
1370
+ "Section": "Protect (PR)",
1371
+ "SubSection": "Protective Technology (PR.PT)",
1372
+ "Service": "aws"
1373
+ }
1374
+ ],
1375
+ "Checks": [
1376
+ "eks_cluster_deletion_protection_enabled",
1377
+ "rds_cluster_deletion_protection",
1378
+ "rds_instance_deletion_protection",
1379
+ "dynamodb_table_deletion_protection_enabled",
1380
+ "directconnect_connection_redundancy",
1381
+ "vpc_endpoint_multi_az_enabled",
1382
+ "elbv2_cross_zone_load_balancing_enabled",
1383
+ "elb_cross_zone_load_balancing_enabled",
1384
+ "autoscaling_group_capacity_rebalance_enabled",
1385
+ "autoscaling_group_multiple_az",
1386
+ "vpc_vpn_connection_tunnels_up",
1387
+ "cloudfront_distributions_multiple_origin_failover_configured",
1388
+ "s3_bucket_cross_region_replication"
1389
+ ]
1390
+ },
1391
+ {
1392
+ "Id": "ae_1",
1393
+ "Name": "DE.AE-1",
1394
+ "Description": "A baseline of network operations and expected data flows for users and systems is established and managed.",
1395
+ "Attributes": [
1396
+ {
1397
+ "ItemId": "ae_1",
1398
+ "Section": "Detect (DE)",
1399
+ "SubSection": "Anomalies and Events (DE.AE)",
1400
+ "Service": "aws"
1401
+ }
1402
+ ],
1403
+ "Checks": [
1404
+ "vpc_flow_logs_enabled",
1405
+ "cloudtrail_cloudwatch_logging_enabled",
1406
+ "cloudtrail_multi_region_enabled_logging_management_events",
1407
+ "cloudtrail_threat_detection_enumeration",
1408
+ "cloudtrail_threat_detection_privilege_escalation",
1409
+ "cloudtrail_threat_detection_llm_jacking",
1410
+ "vpc_endpoint_connections_trust_boundaries",
1411
+ "vpc_endpoint_for_ec2_enabled",
1412
+ "cloudwatch_log_metric_filter_security_group_changes",
1413
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
1414
+ "cloudwatch_log_metric_filter_for_s3_bucket_policy_changes",
1415
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
1416
+ "cloudwatch_log_metric_filter_unauthorized_api_calls"
1417
+ ]
1418
+ },
1419
+ {
1420
+ "Id": "ae_2",
1421
+ "Name": "DE.AE-2",
1422
+ "Description": "Detected events are analyzed to understand attack targets and methods.",
1423
+ "Attributes": [
1424
+ {
1425
+ "ItemId": "ae_2",
1426
+ "Section": "Detect (DE)",
1427
+ "SubSection": "Anomalies and Events (DE.AE)",
1428
+ "Service": "aws"
1429
+ }
1430
+ ],
1431
+ "Checks": [
1432
+ "cloudtrail_threat_detection_llm_jacking",
1433
+ "cloudtrail_threat_detection_enumeration",
1434
+ "cloudtrail_threat_detection_privilege_escalation",
1435
+ "cloudwatch_changes_to_network_gateways_alarm_configured",
1436
+ "cloudwatch_changes_to_network_route_tables_alarm_configured",
1437
+ "cloudwatch_changes_to_vpcs_alarm_configured",
1438
+ "cloudwatch_log_metric_filter_authentication_failures",
1439
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
1440
+ "cloudwatch_log_metric_filter_root_usage",
1441
+ "cloudwatch_log_metric_filter_policy_changes",
1442
+ "cloudwatch_log_metric_filter_security_group_changes",
1443
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
1444
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
1445
+ "cloudwatch_log_metric_filter_for_s3_bucket_policy_changes",
1446
+ "cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk"
1447
+ ]
1448
+ },
1449
+ {
1450
+ "Id": "ae_3",
1451
+ "Name": "DE.AE-3",
1452
+ "Description": "Event data are collected and correlated from multiple sources and sensors.",
1453
+ "Attributes": [
1454
+ {
1455
+ "ItemId": "ae_3",
1456
+ "Section": "Detect (DE)",
1457
+ "SubSection": "Anomalies and Events (DE.AE)",
1458
+ "Service": "aws"
1459
+ }
1460
+ ],
1461
+ "Checks": [
1462
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
1463
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
1464
+ "cloudwatch_changes_to_network_gateways_alarm_configured",
1465
+ "cloudwatch_changes_to_network_route_tables_alarm_configured",
1466
+ "cloudwatch_log_metric_filter_aws_organizations_changes",
1467
+ "cloudtrail_threat_detection_enumeration",
1468
+ "cloudtrail_threat_detection_privilege_escalation",
1469
+ "cloudtrail_threat_detection_llm_jacking",
1470
+ "cloudtrail_cloudwatch_logging_enabled",
1471
+ "cloudtrail_multi_region_enabled_logging_management_events"
1472
+ ]
1473
+ },
1474
+ {
1475
+ "Id": "ae_4",
1476
+ "Name": "DE.AE-4",
1477
+ "Description": "Impact of events is determined.",
1478
+ "Attributes": [
1479
+ {
1480
+ "ItemId": "ae_4",
1481
+ "Section": "Detect (DE)",
1482
+ "SubSection": "Anomalies and Events (DE.AE)",
1483
+ "Service": "aws"
1484
+ }
1485
+ ],
1486
+ "Checks": []
1487
+ },
1488
+ {
1489
+ "Id": "ae_5",
1490
+ "Name": "DE.AE-5",
1491
+ "Description": "Incident alert thresholds are established.",
1492
+ "Attributes": [
1493
+ {
1494
+ "ItemId": "ae_5",
1495
+ "Section": "Detect (DE)",
1496
+ "SubSection": "Anomalies and Events (DE.AE)",
1497
+ "Service": "aws"
1498
+ }
1499
+ ],
1500
+ "Checks": []
1501
+ },
1502
+ {
1503
+ "Id": "cm_1",
1504
+ "Name": "DE.CM-1",
1505
+ "Description": "The network is monitored to detect potential cybersecurity events.",
1506
+ "Attributes": [
1507
+ {
1508
+ "ItemId": "cm_1",
1509
+ "Section": "Detect (DE)",
1510
+ "SubSection": "Security Continuous Monitoring (DE.CM)",
1511
+ "Service": "aws"
1512
+ }
1513
+ ],
1514
+ "Checks": [
1515
+ "cloudtrail_multi_region_enabled_logging_management_events",
1516
+ "cloudtrail_threat_detection_enumeration",
1517
+ "cloudtrail_threat_detection_privilege_escalation",
1518
+ "cloudtrail_threat_detection_llm_jacking",
1519
+ "cloudtrail_insights_exist",
1520
+ "cloudtrail_cloudwatch_logging_enabled",
1521
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
1522
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
1523
+ "cloudwatch_log_metric_filter_authentication_failures",
1524
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
1525
+ "cloudwatch_changes_to_network_gateways_alarm_configured",
1526
+ "cloudwatch_changes_to_network_route_tables_alarm_configured",
1527
+ "cloudwatch_changes_to_vpcs_alarm_configured",
1528
+ "cloudwatch_changes_to_network_acls_alarm_configured",
1529
+ "vpc_flow_logs_enabled",
1530
+ "guardduty_is_enabled",
1531
+ "inspector2_is_enabled",
1532
+ "accessanalyzer_enabled_without_findings"
1533
+ ]
1534
+ },
1535
+ {
1536
+ "Id": "cm_2",
1537
+ "Name": "DE.CM-2",
1538
+ "Description": "The physical environment is monitored to detect potential cybersecurity events.",
1539
+ "Attributes": [
1540
+ {
1541
+ "ItemId": "cm_2",
1542
+ "Section": "Detect (DE)",
1543
+ "SubSection": "Security Continuous Monitoring (DE.CM)",
1544
+ "Service": "aws"
1545
+ }
1546
+ ],
1547
+ "Checks": []
1548
+ },
1549
+ {
1550
+ "Id": "cm_3",
1551
+ "Name": "DE.CM-3",
1552
+ "Description": "Personnel activity is monitored to detect potential cybersecurity events.",
1553
+ "Attributes": [
1554
+ {
1555
+ "ItemId": "cm_3",
1556
+ "Section": "Detect (DE)",
1557
+ "SubSection": "Security Continuous Monitoring (DE.CM)",
1558
+ "Service": "aws"
1559
+ }
1560
+ ],
1561
+ "Checks": [
1562
+ "cloudtrail_threat_detection_privilege_escalation",
1563
+ "cloudtrail_threat_detection_llm_jacking",
1564
+ "cloudtrail_threat_detection_enumeration",
1565
+ "cloudtrail_multi_region_enabled_logging_management_events",
1566
+ "cloudtrail_cloudwatch_logging_enabled",
1567
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
1568
+ "cloudwatch_log_metric_filter_authentication_failures",
1569
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled"
1570
+ ]
1571
+ },
1572
+ {
1573
+ "Id": "cm_4",
1574
+ "Name": "DE.CM-4",
1575
+ "Description": "Malicious code is detected.",
1576
+ "Attributes": [
1577
+ {
1578
+ "ItemId": "cm_4",
1579
+ "Section": "Detect (DE)",
1580
+ "SubSection": "Security Continuous Monitoring (DE.CM)",
1581
+ "Service": "aws"
1582
+ }
1583
+ ],
1584
+ "Checks": [
1585
+ "codebuild_project_source_repo_url_no_sensitive_credentials",
1586
+ "codebuild_project_no_secrets_in_variables"
1587
+ ]
1588
+ },
1589
+ {
1590
+ "Id": "cm_5",
1591
+ "Name": "DE.CM-5",
1592
+ "Description": "Unauthorized mobile code is detected.",
1593
+ "Attributes": [
1594
+ {
1595
+ "ItemId": "cm_5",
1596
+ "Section": "Detect (DE)",
1597
+ "SubSection": "Security Continuous Monitoring (DE.CM)",
1598
+ "Service": "aws"
1599
+ }
1600
+ ],
1601
+ "Checks": []
1602
+ },
1603
+ {
1604
+ "Id": "cm_6",
1605
+ "Name": "DE.CM-6",
1606
+ "Description": "External service provider activity is monitored to detect potential cybersecurity events.",
1607
+ "Attributes": [
1608
+ {
1609
+ "ItemId": "cm_6",
1610
+ "Section": "Detect (DE)",
1611
+ "SubSection": "Security Continuous Monitoring (DE.CM)",
1612
+ "Service": "aws"
1613
+ }
1614
+ ],
1615
+ "Checks": [
1616
+ "cloudtrail_threat_detection_llm_jacking",
1617
+ "cloudtrail_threat_detection_enumeration",
1618
+ "cloudtrail_threat_detection_privilege_escalation"
1619
+ ]
1620
+ },
1621
+ {
1622
+ "Id": "cm_7",
1623
+ "Name": "DE.CM-7",
1624
+ "Description": "Monitoring for unauthorized personnel, connections, devices, and software is performed.",
1625
+ "Attributes": [
1626
+ {
1627
+ "ItemId": "cm_7",
1628
+ "Section": "Detect (DE)",
1629
+ "SubSection": "Security Continuous Monitoring (DE.CM)",
1630
+ "Service": "aws"
1631
+ }
1632
+ ],
1633
+ "Checks": [
1634
+ "cloudtrail_cloudwatch_logging_enabled",
1635
+ "cloudtrail_threat_detection_privilege_escalation",
1636
+ "cloudtrail_threat_detection_enumeration",
1637
+ "cloudtrail_threat_detection_llm_jacking",
1638
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
1639
+ "cloudwatch_log_metric_filter_authentication_failures",
1640
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
1641
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
1642
+ "cloudwatch_log_metric_filter_security_group_changes",
1643
+ "cloudwatch_log_metric_filter_root_usage",
1644
+ "cloudwatch_log_metric_filter_aws_organizations_changes",
1645
+ "cloudwatch_log_metric_filter_policy_changes",
1646
+ "cloudwatch_log_metric_filter_for_s3_bucket_policy_changes",
1647
+ "cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk",
1648
+ "guardduty_is_enabled",
1649
+ "guardduty_ec2_malware_protection_enabled",
1650
+ "guardduty_s3_protection_enabled",
1651
+ "guardduty_rds_protection_enabled",
1652
+ "guardduty_lambda_protection_enabled",
1653
+ "guardduty_eks_runtime_monitoring_enabled"
1654
+ ]
1655
+ },
1656
+ {
1657
+ "Id": "dp_4",
1658
+ "Name": "DE.DP-4",
1659
+ "Description": "Event detection information is communicated.",
1660
+ "Attributes": [
1661
+ {
1662
+ "ItemId": "dp_4",
1663
+ "Section": "Detect (DE)",
1664
+ "SubSection": "Detection Processes (DE.DP)",
1665
+ "Service": "aws"
1666
+ }
1667
+ ],
1668
+ "Checks": [
1669
+ "cloudtrail_threat_detection_llm_jacking",
1670
+ "cloudtrail_threat_detection_enumeration",
1671
+ "cloudtrail_threat_detection_privilege_escalation",
1672
+ "cloudtrail_multi_region_enabled_logging_management_events",
1673
+ "cloudtrail_insights_exist",
1674
+ "cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled",
1675
+ "cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled",
1676
+ "cloudwatch_log_metric_filter_authentication_failures",
1677
+ "cloudwatch_log_metric_filter_unauthorized_api_calls",
1678
+ "cloudwatch_alarm_actions_alarm_state_configured",
1679
+ "cloudwatch_alarm_actions_enabled",
1680
+ "cloudwatch_log_metric_filter_security_group_changes",
1681
+ "cloudwatch_log_metric_filter_root_usage",
1682
+ "cloudwatch_changes_to_network_gateways_alarm_configured",
1683
+ "cloudwatch_changes_to_network_route_tables_alarm_configured",
1684
+ "cloudwatch_changes_to_network_acls_alarm_configured",
1685
+ "eventbridge_bus_cross_account_access",
1686
+ "eventbridge_bus_exposed",
1687
+ "route53_dangling_ip_subdomain_takeover",
1688
+ "s3_bucket_event_notifications_enabled",
1689
+ "sns_subscription_not_using_http_endpoints"
1690
+ ]
1691
+ },
1692
+ {
1693
+ "Id": "dp_5",
1694
+ "Name": "DE.DP-5",
1695
+ "Description": "Detection processes are continuously improved.",
1696
+ "Attributes": [
1697
+ {
1698
+ "ItemId": "dp_5",
1699
+ "Section": "Detect (DE)",
1700
+ "SubSection": "Detection Processes (DE.DP)",
1701
+ "Service": "ec2"
1702
+ }
1703
+ ],
1704
+ "Checks": []
1705
+ },
1706
+ {
1707
+ "Id": "an_2",
1708
+ "Name": "RS.AN-2",
1709
+ "Description": "The impact of the incident is understood.",
1710
+ "Attributes": [
1711
+ {
1712
+ "ItemId": "an_2",
1713
+ "Section": "Respond (RS)",
1714
+ "SubSection": "Analysis (RS.AN)",
1715
+ "Service": "guardduty"
1716
+ }
1717
+ ],
1718
+ "Checks": []
1719
+ },
1720
+ {
1721
+ "Id": "mi_3",
1722
+ "Name": "RS.MI-3",
1723
+ "Description": "Newly identified vulnerabilities are mitigated or documented as accepted risks.",
1724
+ "Attributes": [
1725
+ {
1726
+ "ItemId": "mi_3",
1727
+ "Section": "Respond (RS)",
1728
+ "SubSection": "Mitigation (RS.MI)",
1729
+ "Service": "guardduty"
1730
+ }
1731
+ ],
1732
+ "Checks": []
1733
+ },
1734
+ {
1735
+ "Id": "rp_1",
1736
+ "Name": "RS.RP-1",
1737
+ "Description": "Response plan is executed during or after an incident.",
1738
+ "Attributes": [
1739
+ {
1740
+ "ItemId": "rp_1",
1741
+ "Section": "Respond (RS)",
1742
+ "SubSection": "Response Planning (RS.RP)",
1743
+ "Service": "aws"
1744
+ }
1745
+ ],
1746
+ "Checks": [
1747
+ "ssmincidents_enabled_with_plans"
1748
+ ]
1749
+ },
1750
+ {
1751
+ "Id": "rc_rp_1",
1752
+ "Name": "RC.RP-1",
1753
+ "Description": "Recovery plan is executed during or after a cybersecurity incident.",
1754
+ "Attributes": [
1755
+ {
1756
+ "ItemId": "rc_rp_1",
1757
+ "Section": "Recover (RC)",
1758
+ "SubSection": "Recovery Planning (RC.RP)",
1759
+ "Service": "aws"
1760
+ }
1761
+ ],
1762
+ "Checks": [
1763
+ "backup_vaults_exist",
1764
+ "backup_vaults_encrypted",
1765
+ "backup_recovery_point_encrypted",
1766
+ "backup_reportplans_exist",
1767
+ "backup_plans_exist",
1768
+ "documentdb_cluster_backup_enabled",
1769
+ "dynamodb_table_protected_by_backup_plan",
1770
+ "ec2_ebs_volume_protected_by_backup_plan",
1771
+ "efs_have_backup_enabled",
1772
+ "elasticache_redis_cluster_backup_enabled",
1773
+ "fsx_file_system_copy_tags_to_backups_enabled",
1774
+ "neptune_cluster_backup_enabled",
1775
+ "rds_cluster_protected_by_backup_plan",
1776
+ "rds_instance_backup_enabled",
1777
+ "rds_instance_protected_by_backup_plan"
1778
+ ]
1779
+ }
1780
+ ]
1781
+ }